First published: Mon Feb 28 2000(Updated: )
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =5.1 | |
Red Hat Linux | =5.2 | |
Mandrake Linux | =7.0 | |
Red Hat Linux | =6.0 | |
Turbolinux | =4.4 | |
Turbolinux | =4.2 | |
Turbolinux | =6.0.2 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
FreeBSD Kernel | =3.4 | |
Mandrake Linux | =6.1 | |
=3.4 | ||
=6.1 | ||
=7.0 | ||
=5.1 | ||
=5.2 | ||
=6.0 | ||
=6.1 | ||
=6.2 | ||
=4.2 | ||
=4.4 | ||
=6.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0186 is considered a high severity vulnerability due to the potential for local users to gain elevated privileges.
To fix CVE-2000-0186, update the affected software to the latest version provided by your Linux distribution.
CVE-2000-0186 affects several Linux distributions including FreeBSD 3.4, Mandrake Linux 6.1 and 7.0, and various versions of Red Hat Linux.
CVE-2000-0186 is a buffer overflow vulnerability that arises from improper handling of long command line arguments.
CVE-2000-0186 cannot be exploited remotely as it requires local user access to the system.