First published: Fri Mar 03 2000(Updated: )
The mtr program only uses a seteuid call when attempting to drop privileges, which could allow local users to gain root privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Matt Kimball and Roger Wolff MTR | =0.28 | |
Matt Kimball and Roger Wolff MTR | =0.41 | |
Turbolinux | =3.5b2 | |
Turbolinux | =4.2 | |
Turbolinux | =4.4 | |
Turbolinux | =6.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2000-0172 is considered high due to the potential for local users to gain root privileges.
To fix CVE-2000-0172, update to a version of the mtr program that is not affected, specifically versions later than 0.41.
CVE-2000-0172 affects mtr versions 0.28 and 0.41, along with specific versions of Turbolinux.
CVE-2000-0172 is a local vulnerability and cannot be exploited remotely.
Local users on systems running the vulnerable versions of mtr can be affected by CVE-2000-0172.