CVE-2000-0229
Published Mar 22, 2000
Last updated 16 years ago
Overview
- Description
- gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:alessandro_rubini:gpm:1.18.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD68842D-DD39-4FFD-95B5-0A4BB28D9F94" }, { "criteria": "cpe:2.3:o:alessandro_rubini:gpm:1.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8156E792-8374-41CD-B60C-DAB2911E7169" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C67BDA1-9451-4026-AC6D-E912C882A757" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58B90124-0543-4226-BFF4-13CCCBCCB243" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:pre_potato:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B19ABCB-70F0-450E-9A71-2EE8F2BFB2EE" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89F65C9D-BD68-4A86-BFDC-E7CE76F13948" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F" }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7EC2B95-4715-4EC9-A10A-2542501F8A61" }, { "criteria": "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCC94EF9-5872-402F-B2FC-06331A924BB2" }, { "criteria": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F163E145-09F7-4BE2-9B46-5B6713070BAB" }, { "criteria": "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "124E1802-7984-45ED-8A92-393FC20662FD" }, { "criteria": "cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B67020A-6942-4478-B501-764147C4970D" }, { "criteria": "cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AD0FF64-05DF-48C2-9BB5-FD993121FB2E" } ], "operator": "OR" } ] } ]