First published: Tue Dec 19 2000(Updated: )
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Caldera OpenLinux eBuilder | =3.0 | |
Trustix Secure Linux | =1.1 | |
Red Hat Linux | =7.0 | |
Trustix Secure Linux | =1.0 | |
SCO OpenLinux Server | ||
SCO OpenLinux Server | =2.3 | |
Caldera OpenLinux eDesktop | =2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0917 has a high severity rating due to its potential to allow remote attackers to execute arbitrary commands.
To fix CVE-2000-0917, upgrade to a patched version of LPRng that addresses the format string vulnerability.
CVE-2000-0917 affects LPRng versions 3.6.24 on various systems including Caldera OpenLinux, Trustix Secure Linux, and Red Hat Linux.
Yes, CVE-2000-0917 can be exploited remotely, allowing attackers to gain control of a vulnerable system.
CVE-2000-0917 can lead to command execution attacks, where an attacker could run arbitrary commands on the affected system.