First published: Mon May 22 2000(Updated: )
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =6.2 | |
Slackware Linux | =3.5 | |
Slackware Linux | =3.4 | |
SCO OpenLinux Server | =7.0 | |
Slackware Linux | =3.9 | |
SUSE Linux | =5.0 | |
SUSE Linux | =4.4.1 | |
Slackware Linux | =4.0 | |
SUSE Linux | =5.2 | |
SUSE Linux | =6.0 | |
Turbolinux | =6.0.1 | |
Turbolinux | =6.0 | |
Turbolinux | =6.0.2 | |
SUSE Linux | =6.1 | |
SUSE Linux | =4.3 | |
SUSE Linux | =4.4 | |
SUSE Linux | =5.1 | |
SUSE Linux | =7.0 | |
Slackware Linux | =3.6 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.4 | |
Slackware Linux | =3.3 | |
SUSE Linux | =4.2 | |
SUSE Linux | =5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0438 is classified as a high severity vulnerability due to its potential to allow local users to execute arbitrary commands.
To fix CVE-2000-0438, patch your system or upgrade to a fixed version of the affected software.
CVE-2000-0438 affects various versions of SUSE Linux, Slackware Linux, and SCO OpenLinux.
CVE-2000-0438 is caused by a buffer overflow in the fdmount utility that improperly handles long mountpoint parameters.
CVE-2000-0438 can be exploited by local users who are members of the 'floppy' group on the affected systems.