First published: Wed Jul 12 2000(Updated: )
Buffer overflow in mailx mail command (aka Mail) on Linux systems allows local users to gain privileges via a long -c (carbon copy) parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mailx | =3 | |
Mailx | =4 | |
Mailx | =5 | |
Mailx | =6.0.1 | |
Mailx | =6.1 | |
Mailx | =6.2 | |
Mailx | =6.3 | |
Mailx | =6.4 | |
Mailx | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0545 is considered a high-severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2000-0545, users should upgrade the mailx software to a safer version or apply relevant patches provided by the vendor.
CVE-2000-0545 affects various versions of the mailx command on Linux systems, specifically versions 3, 4, 5, 6.0.1, 6.1, 6.2, 6.3, 6.4, 6.5.
CVE-2000-0545 is not remotely exploitable as it requires local access to the system.
Local users on systems running vulnerable versions of mailx can be affected by CVE-2000-0545.