CVE-2000-1221
Published Jan 8, 2000
Last updated 7 years ago
Overview
- Description
- The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36B60E50-4F5A-4404-BEA3-C94F7D27B156" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ECB750B-9F53-4DB6-8B26-71BCCA446FF7" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "440B7208-34DB-4898-8461-4E703F7EDFB7" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5663579C-3AD2-4E5B-A595-C8DB984F9C26" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D07AA144-6FD7-4C80-B4F2-D21C1AFC864A" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29113D8E-9618-4A0E-9157-678332082858" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "313613E9-4837-433C-90EE-84A92E8D24E5" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41AA1290-5039-406F-B195-3A4C018202D3" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60CC9410-F6B8-4748-B76F-30626279028E" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCC67401-C85A-4E4E-AE61-85FEBBF4346B" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C4427AC-07C1-4765-981B-B5D86D698C2D" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63EF0CEE-74A9-45C8-8AFD-77815230ACC6" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7B59E7C-B059-41CD-AE33-E9623ADA12BC" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DF1B657-C910-4BB0-828C-09B6A59D988D" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72D61A9F-AC57-4DD9-9047-74BFA9BFACFC" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C254FC5D-895D-4EFC-B9A7-74699D9FE65E" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27532639-37CD-4BD2-AE48-F741009D3449" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F83879DE-1BD7-4FF7-ACC6-5B119DB09BF9" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EED22734-8AAC-4897-BB71-438E19B8A005" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEA9C28F-18E6-4199-9740-FAB00563EBF7" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6E63313-9533-478D-ACC0-C050FBA3EACF" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA0A7D5D-BDD9-45F8-9BE7-3B01D70C8CC1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C67BDA1-9451-4026-AC6D-E912C882A757" }, { "criteria": "cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8211154-6685-4FF0-B3ED-43A5E5763A10" }, { "criteria": "cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F299301C-6BFC-436C-9CFD-2E291D3702AE" }, { "criteria": "cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1" }, { "criteria": "cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DFA94D5-0139-490C-8257-0751FE9FBAE4" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F" } ], "operator": "OR" } ] } ]