CVE-2000-0844

Severity

99%

Complexity

99%

Confidentiality

165%

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.

CVSS 2.0 Base Score 9.9. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).

Overview

First reported 24 years ago

2000-11-14 05:00:00

Last updated 6 years ago

2018-10-30 16:26:00

Affected Software

Conectiva Conectiva Linux 4.0

4.0

Conectiva Conectiva Linux 4.0es

4.0es

Conectiva Conectiva Linux 4.1

4.1

Conectiva Conectiva Linux 4.2

4.2

Conectiva Conectiva Linux 5.0

5.0

Conectiva Conectiva Linux 5.1

5.1

SGI IRIX 6.2

6.2

SGI IRIX 6.3

6.3

SGI IRIX 6.4

6.4

SGI IRIX 6.5

6.5

SGI IRIX 6.5.1

6.5.1

SGI IRIX 6.5.2m

6.5.2m

SGI IRIX 6.5.3

6.5.3

SGI IRIX 6.5.3f

6.5.3f

SGI IRIX 6.5.3m

6.5.3m

SGI IRIX 6.5.4

6.5.4

SGI IRIX 6.5.6

6.5.6

SGI IRIX 6.5.7

6.5.7

SGI IRIX 6.5.8

6.5.8

Debian Debian Linux 2.0

2.0

Debian Debian Linux 2.1

2.1

Debian Debian Linux 2.2

2.2

Debian Debian Linux 2.3

2.3

IBM AIX 3.2

3.2

IBM AIX 3.2.4

3.2.4

IBM AIX 3.2.5

3.2.5

IBM AIX 4.0

4.0

IBM AIX 4.1

4.1

IBM AIX 4.1.1

4.1.1

IBM AIX 4.1.2

4.1.2

IBM AIX 4.1.3

4.1.3

IBM AIX 4.1.4

4.1.4

IBM AIX 4.1.5

4.1.5

IBM AIX 4.2

4.2

IBM AIX 4.2.1

4.2.1

IBM AIX 4.3

4.3

IBM AIX 4.3.1

4.3.1

IBM AIX 4.3.2

4.3.2

MandrakeSoft Mandrake Linux 7.0

7.0

MandrakeSoft Mandrake Linux 7.1

7.1

Red Hat Linux 5.0

5.0

Red Hat Linux 5.1

5.1

Red Hat Linux 5.2

5.2

Red Hat Linux 6.0

6.0

Red Hat Linux 6.1

6.1

Red Hat Linux 6.2

6.2

Slackware Linux 7.0

7.0

Slackware Linux 7.1

7.1

Sun Solaris 2.6

2.6

Sun Microsystems Solaris 2.0

5.0

Sun Microsystems Solaris 2.1

5.1

Sun Microsystems Solaris 2.2

5.2

Sun Microsystems Solaris 2.3

5.3

Sun Microsystems Solaris 2.4

5.4

Sun Microsystems Solaris 2.5

5.5

Sun Microsystems Solaris 2.5.1

5.5.1

Sun Microsystems Solaris 7

5.7

Sun SunOS (Solaris 8) 5.8

5.8

SuSE SuSE Linux 6.1

6.1

SuSE SuSE Linux 6.2

6.2

SuSE SuSE Linux 6.3

6.3

SuSE SuSE Linux 6.4

6.4

SuSE SuSE Linux 7.0

7.0

Trustix Trustix Linux 1.0

1.0

Trustix Secure Linux 1.1

1.1

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.