CVE-2000-0607
Published Jun 21, 2000
Last updated a year ago
Overview
- Description
- Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C67BDA1-9451-4026-AC6D-E912C882A757" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58B90124-0543-4226-BFF4-13CCCBCCB243" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "618111F3-6608-47F0-AB0D-21547E342871" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACAAD334-2CA7-4B3B-BA25-302E7610BC2A" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4853E92-5E0A-47B9-A343-D5BEE87D2C27" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EC1FF5D-5EAB-44D5-B281-770547C70D68" }, { "criteria": "cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1" }, { "criteria": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EF44364-0F57-4B74-81B0-501EA6B58501" }, { "criteria": "cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8EED385-8C39-4A40-A507-2EFE7652FB35" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76" }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0633B5A6-7A88-4A96-9462-4C09D124ED36" } ], "operator": "OR" } ] } ]