First published: Tue Nov 14 2000(Updated: )
Multiple buffer overflows in eject on FreeBSD and possibly other OSes allows local users to gain root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =3.0 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =5.0-alpha | |
FreeBSD Kernel | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0852 is considered a high severity vulnerability due to the potential for local users to gain root privileges.
The recommended fix for CVE-2000-0852 is to update to a patched version of FreeBSD or to implement security controls to restrict user access.
CVE-2000-0852 affects FreeBSD versions 3.0, 4.0, 5.0, and 5.0-alpha.
CVE-2000-0852 is classified as a buffer overflow vulnerability.
CVE-2000-0852 is a local vulnerability, meaning it requires local access to exploit.