CVE-2000-0196
Published Feb 28, 2000
Last updated 16 years ago
Overview
- Description
- Buffer overflow in mhshow in the Linux nmh package allows remote attackers to execute commands via malformed MIME headers in an email message.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:nmh:nmh:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEE22340-554C-4E8F-970B-27264B89F0B0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux:5.2:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07396B95-E434-46C9-A345-27C9EA9BEA26" }, { "criteria": "cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07" }, { "criteria": "cpe:2.3:o:redhat:linux:5.2:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0775CE08-C5AD-4FF7-AEA9-537B1EAE3BDE" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6931FB54-A163-4CE3-BBD9-D345AA0977A6" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89F65C9D-BD68-4A86-BFDC-E7CE76F13948" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5ABD1331-277C-4C31-8186-978243C62255" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C89454B9-4F45-4A42-A06D-ED42D893C544" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E64093E-7D53-4238-95C3-48ED5A0FFD97" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux:3.5b2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "667CF388-298D-4B64-9BA5-89D153FFA998" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D15A193-3E01-467C-AEAD-497F4600DB06" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7C765FF-0A3D-4BF4-B236-609658776ACA" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6619B49-8A89-4600-A47F-A39C8BF54259" } ], "operator": "OR" } ] } ]