First published: Wed Jun 21 2000(Updated: )
Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =2.3 | |
Red Hat Linux | =5.1 | |
Debian Debian Linux | =2.2 | |
Debian Debian Linux | =2.1 | |
Mandrake Linux | =7.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =5.0 | |
Mandrake Linux | =7.1 | |
Red Hat Linux | =5.2 | |
Debian Debian Linux | =2.0 | |
Mandrake Linux | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0606 has a high severity rating due to its potential for local users to gain root privileges through a buffer overflow.
To fix CVE-2000-0606, you should update to a version of the KON package that has resolved this buffer overflow vulnerability.
CVE-2000-0606 affects various versions of Debian Linux and Red Hat Linux, specifically older releases like 2.0 to 2.3 for Debian and 5.0 to 6.2 for Red Hat.
CVE-2000-0606 is caused by a buffer overflow due to the use of excessively long -StartupMessage parameters in the KON program.
CVE-2000-0606 cannot be exploited remotely as it requires local access to the affected system.