First published: Tue Nov 14 2000(Updated: )
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trustix Secure Linux | =1.1 | |
Mandrake Linux | =7.0 | |
Red Hat Linux | =6.2 | |
Mandrake Linux | =7.1 | |
Debian Debian Linux | =2.1 | |
Red Hat Linux | =5.2 | |
Mandrake Linux | =6.0 | |
Slackware Linux | ||
Mandrake Linux | =6.1 | |
Debian Debian Linux | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0867 is considered a critical vulnerability that allows local users to gain root privileges on affected systems.
To fix CVE-2000-0867, you should upgrade to the latest patched version of the affected operating systems or apply the available security patches.
CVE-2000-0867 affects several systems including Trustix Secure Linux 1.1, Mandrake Linux 6.0 to 7.1, Red Hat Linux 5.2 to 6.2, and Debian Linux versions 2.1 and 2.2.
Local users with access to the affected operating systems can exploit CVE-2000-0867 to gain unauthorized root privileges.
CVE-2000-0867 exploits improper cleansing of user-injected format strings in the kernel logging daemon, enabling privilege escalation.