CVE-2000-0118
Published Jun 9, 1999
Last updated 6 years ago
Overview
- Description
- The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5302613E-F0DD-4B46-884C-49A977FD4147" }, { "criteria": "cpe:2.3:o:redhat:linux:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "674066BB-2576-4AAE-B97F-A4470815F1AC" }, { "criteria": "cpe:2.3:o:redhat:linux:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "445EECD3-2DB9-43D1-B26F-0979A3C02D45" }, { "criteria": "cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9092D88-585D-4A0C-B181-E8D93563C74B" }, { "criteria": "cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8211154-6685-4FF0-B3ED-43A5E5763A10" }, { "criteria": "cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F299301C-6BFC-436C-9CFD-2E291D3702AE" }, { "criteria": "cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1" }, { "criteria": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EF44364-0F57-4B74-81B0-501EA6B58501" }, { "criteria": "cpe:2.3:o:redhat:linux:5.2:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07396B95-E434-46C9-A345-27C9EA9BEA26" }, { "criteria": "cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07" }, { "criteria": "cpe:2.3:o:redhat:linux:5.2:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0775CE08-C5AD-4FF7-AEA9-537B1EAE3BDE" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6931FB54-A163-4CE3-BBD9-D345AA0977A6" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89F65C9D-BD68-4A86-BFDC-E7CE76F13948" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5ABD1331-277C-4C31-8186-978243C62255" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C89454B9-4F45-4A42-A06D-ED42D893C544" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E64093E-7D53-4238-95C3-48ED5A0FFD97" }, { "criteria": "cpe:2.3:o:sun:solaris:*:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEEC0C5A-4A6E-403C-B929-D1EC8B0FE2A8" }, { "criteria": "cpe:2.3:o:sun:solaris:1.1.3:u1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3373737-C6FC-4D19-845C-B0382AE1DC48" }, { "criteria": "cpe:2.3:o:sun:solaris:1.1.4:*:jl:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10EC0267-500D-496F-9D88-7F93F7D4A88B" }, { "criteria": "cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F881110-7B54-49DA-B23A-710273430C44" }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB" }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "615FA6E4-4DE0-422A-9220-F747D95192C9" }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1070749A-65E9-439A-A7CC-3CE529A5D5E7" }, { "criteria": "cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1370216-93EB-400F-9AA6-CB2DC316DAA7" }, { "criteria": "cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FF2C7C4-6F8D-40DB-9FBC-E7E4D76A2B23" }, { "criteria": "cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84523B48-218B-45F4-9C04-2C103612DCB2" }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6" }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F" }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416" } ], "operator": "OR" } ] } ]