First published: Wed Mar 22 2000(Updated: )
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
alessandro rubini gpm | =1.18.1 | |
alessandro rubini gpm | =1.19 | |
Debian Debian Linux | =2.0 | |
Debian Debian Linux | =2.1 | |
Debian Debian Linux | =2.2 | |
Debian Debian Linux | =2.2 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
SUSE Linux | =5.3 | |
SUSE Linux | =6.0 | |
SUSE Linux | =6.1 | |
SUSE Linux | =6.2 | |
SUSE Linux | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0229 is classified as a local privilege escalation vulnerability.
To fix CVE-2000-0229, update the gpm package to the latest version that addresses this vulnerability.
CVE-2000-0229 affects local users on systems running the vulnerable versions of the gpm package.
Versions 1.18.1 and 1.19 of the gpm package are specifically vulnerable to CVE-2000-0229.
The vulnerability could allow local users to gain unauthorized root privileges, posing a significant security risk.