First published: Tue Nov 14 2000(Updated: )
The tmpwatch utility in Red Hat Linux forks a new process for each directory level, which allows local users to cause a denial of service by creating deeply nested directories in /tmp or /var/tmp/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Tmpwatch | =2.5.1 | |
Red Hat Tmpwatch | =2.2 | |
Red Hat Linux | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0829 has a low severity rating, primarily causing a denial of service for local users.
To fix CVE-2000-0829, users should update the tmpwatch utility to a version that is not affected by this vulnerability.
CVE-2000-0829 affects specific versions of Red Hat Linux, including tmpwatch 2.5.1 and 2.2, as well as Red Hat Linux 6.1.
No, CVE-2000-0829 can only be exploited locally by users who have access to the affected systems.
CVE-2000-0829 allows for a denial of service by leading to excessive resource consumption through the creation of deeply nested directories.