First published: Tue Jan 09 2001(Updated: )
Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows attackers to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2000-1189 is considered high due to the potential for privilege escalation.
To fix CVE-2000-1189, update the pam_localuser PAM module to the latest patched version available for your Red Hat Linux system.
CVE-2000-1189 affects Red Hat Linux versions 6.0, 6.1, 6.2, and 7.0 on various architectures.
CVE-2000-1189 requires local access, so exploitation cannot occur remotely.
The potential impacts of CVE-2000-1189 include unauthorized privilege escalation, which can lead to full system control.