First published: Sun Jul 16 2000(Updated: )
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Conectiva Linux | =4.2 | |
Conectiva Linux | =4.1 | |
Conectiva Linux | =5.1 | |
Conectiva Linux | =4.0es | |
Conectiva Linux | =5.0 | |
Conectiva Linux | =4.0 | |
Suse Suse Linux | =6.3 | |
Debian Debian Linux | =2.3 | |
Debian Debian Linux | =2.2 | |
Debian Debian Linux | =2.3 | |
Trustix Secure Linux | =1.1 | |
Debian Debian Linux | =2.3 | |
Redhat Linux | =6.1 | |
Debian Debian Linux | =2.2 | |
Redhat Linux | =6.2 | |
Redhat Linux | =6.0 | |
Redhat Linux | =6.1 | |
Redhat Linux | =6.0 | |
Debian Debian Linux | =2.2 | |
Suse Suse Linux | =6.3-alpha | |
Trustix Secure Linux | =1.0 | |
Redhat Linux | =6.2 | |
Suse Suse Linux | =6.4 | |
Debian Debian Linux | =2.2 | |
Redhat Linux | =6.0 | |
Suse Suse Linux | =7.0 | |
Suse Suse Linux | =6.3 | |
Redhat Linux | =6.1 | |
Redhat Linux | =6.2 | |
Suse Suse Linux | =6.4 | |
Suse Suse Linux | =6.4-alpha | |
Debian Debian Linux | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.