CVE-2000-0666

Current Description

rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.

Basic Data

PublishedJuly 16, 2000
Last ModifiedMay 03, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSConectivaLinux4.0*******
    2.3OSConectivaLinux4.0es*******
    2.3OSConectivaLinux4.1*******
    2.3OSConectivaLinux4.2*******
    2.3OSConectivaLinux5.0*******
    2.3OSConectivaLinux5.1*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux2.2*******
    2.3OSDebianDebian Linux2.2*alpha*****
    2.3OSDebianDebian Linux2.2*powerpc*****
    2.3OSDebianDebian Linux2.2*sparc*****
    2.3OSDebianDebian Linux2.3*******
    2.3OSDebianDebian Linux2.3*alpha*****
    2.3OSDebianDebian Linux2.3*powerpc*****
    2.3OSDebianDebian Linux2.3*sparc*****
    2.3OSRedhatLinux6.0*alpha*****
    2.3OSRedhatLinux6.0*i386*****
    2.3OSRedhatLinux6.0*sparc*****
    2.3OSRedhatLinux6.1*alpha*****
    2.3OSRedhatLinux6.1*i386*****
    2.3OSRedhatLinux6.1*sparc*****
    2.3OSRedhatLinux6.2*alpha*****
    2.3OSRedhatLinux6.2*i386*****
    2.3OSRedhatLinux6.2*sparc*****
    2.3OSSuseSuse Linux6.3*******
    2.3OSSuseSuse Linux6.3*ppc*****
    2.3OSSuseSuse Linux6.3alpha******
    2.3OSSuseSuse Linux6.4*******
    2.3OSSuseSuse Linux6.4*ppc*****
    2.3OSSuseSuse Linux6.4alpha******
    2.3OSSuseSuse Linux7.0*******
    2.3OSTrustixSecure Linux1.0*******
    2.3OSTrustixSecure Linux1.1*******

Vulnerable Software List

VendorProductVersions
Debian Debian Linux 2.2, 2.3
Redhat Linux 6.0, 6.1, 6.2
Conectiva Linux 4.0, 4.0es, 4.1, 4.2, 5.0, 5.1
Trustix Secure Linux 1.0, 1.1
Suse Suse Linux 6.3, 6.4, 7.0

References

NameSourceURLTags
20000716 Lots and lots of fun with rpc.statdhttp://archives.neohapsis.com/archives/bugtraq/2000-07/0206.htmlBUGTRAQExploit Patch Vendor Advisory
20000717 CONECTIVA LINUX SECURITY ANNOUNCEMENT - nfs-utilshttp://archives.neohapsis.com/archives/bugtraq/2000-07/0230.htmlBUGTRAQ
20000718 Trustix Security Advisory - nfs-utilshttp://archives.neohapsis.com/archives/bugtraq/2000-07/0236.htmlBUGTRAQ
20000718 [Security Announce] MDKSA-2000:021 nfs-utils updatehttp://archives.neohapsis.com/archives/bugtraq/2000-07/0260.htmlBUGTRAQ
CSSA-2000-025.0http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txtCALDERA
CA-2000-17http://www.cert.org/advisories/CA-2000-17.htmlCERTUS Government Resource
RHSA-2000:043http://www.redhat.com/support/errata/RHSA-2000-043.htmlREDHAT
1480http://www.securityfocus.com/bid/1480BIDExploit Patch Vendor Advisory
linux-rpcstatd-format-overwrite(4939)https://exchange.xforce.ibmcloud.com/vulnerabilities/4939XF