Redhat » Linux » 4.0 * * * : Security Vulnerabilities (Gain Privilege)
Cpe Name:
cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2000-1220 |
|
|
Exec Code +Priv |
2000-01-08 |
2017-07-11 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. |
2 |
CVE-2000-0170 |
|
|
Overflow +Priv |
2000-02-26 |
2008-09-10 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable. |
3 |
CVE-1999-1182 |
|
|
Overflow +Priv |
1997-07-17 |
2016-10-18 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error. |
4 |
CVE-1999-0130 |
|
|
+Priv |
1996-11-16 |
2008-09-09 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Local users can start Sendmail in daemon mode and gain root privileges. |
Total number of vulnerabilities :
4
Page :
1
(This Page)