First published: Tue Jan 09 2001(Updated: )
modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Conectiva Linux | =5.1 | |
CentOS Dos2unix | =6.2 | |
CentOS Dos2unix | =7.0_beta | |
Mandrake Linux | =7.2 | |
Red Hat Linux | =7.0 | |
SUSE Linux | =7.0 | |
SUSE Linux | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-1095 is considered a high severity vulnerability due to its ability to allow local users to execute arbitrary commands.
To fix CVE-2000-1095, update the modutils package to a version that includes the security patches for this vulnerability.
CVE-2000-1095 affects multiple Linux distributions, including Conectiva Linux 5.1, Immunix 6.2 and 7.0_beta, Mandrake Linux 7.2, Red Hat Linux 7.0, and SUSE Linux 6.4 and 7.0.
Exploiting CVE-2000-1095 can lead to unauthorized command execution by local users, potentially compromising system integrity and security.
As a workaround for CVE-2000-1095, restrict access to the modprobe command and limit the privileges of local users until an official patch is applied.