First published: Tue Dec 19 2000(Updated: )
Format string vulnerability in pw_error function in BSD libutil library allows local users to gain root privileges via a malformed password in commands such as chpass or passwd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD NetBSD | =1.4.2 | |
OpenBSD | =2.7 | |
OpenBSD | =2.4 | |
FreeBSD FreeBSD | =3.2 | |
FreeBSD FreeBSD | =3.3 | |
FreeBSD FreeBSD | =4.0 | |
FreeBSD FreeBSD | =3.4 | |
FreeBSD FreeBSD | =3.5 | |
NetBSD NetBSD | =1.4 | |
OpenBSD | =2.6 | |
NetBSD NetBSD | =1.4.1 | |
OpenBSD | =2.5 | |
OpenBSD | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0993 is considered to have a high severity level due to its potential to allow local users to gain root privileges.
To fix CVE-2000-0993, upgrade the affected BSD operating systems to their latest versions that contain the security patches.
CVE-2000-0993 affects multiple versions of NetBSD, OpenBSD, and FreeBSD, particularly around their passwd functionalities.
The impact of CVE-2000-0993 is that local users can leverage the format string vulnerability to execute arbitrary code with root privileges.
No, CVE-2000-0993 is a local vulnerability, meaning it requires an attacker to have local access to the affected system.