First published: Fri Jun 09 2000(Updated: )
The "capabilities" feature in Linux before 2.2.16 allows local users to cause a denial of service or gain privileges by setting the capabilities to prevent a setuid program from dropping privileges, aka the "Linux kernel setuid/setcap vulnerability."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.0 | |
Linux Kernel | =2.0.30 | |
Linux Kernel | =2.0.33 | |
Linux Kernel | =2.0.34 | |
Linux Kernel | =2.0.35 | |
Linux Kernel | =2.0.36 | |
Linux Kernel | =2.0.37 | |
Linux Kernel | =2.0.38 | |
Linux Kernel | =2.1 | |
Linux Kernel | =2.2.0 | |
Linux Kernel | =2.2.10 | |
Linux Kernel | =2.2.12 | |
Linux Kernel | =2.2.13 | |
Linux Kernel | =2.2.14 | |
Linux Kernel | =2.2.15 | |
Linux Kernel | =2.2.15-pre16 | |
Linux Kernel | =2.2.15_pre20 | |
Linux Kernel | =2.2.16 | |
Linux Kernel | =2.2.16-pre5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0506 is considered a high severity vulnerability that can lead to a denial of service or privilege escalation.
To fix CVE-2000-0506, you should upgrade your Linux kernel to version 2.2.16 or later.
CVE-2000-0506 affects Linux kernel versions prior to 2.2.16.
CVE-2000-0506 can be exploited through local user actions that manipulate capabilities of setuid programs.
No, CVE-2000-0506 is mainly a concern for outdated systems running vulnerable versions of the Linux kernel.