CVE-2000-0844

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20000901-01-P
http://archives.neohapsis.com/archives/bugtraq/2000-08/0436.html
http://archives.neohapsis.com/archives/bugtraq/2000-08/0457.html Exploit Patch Vendor Advisory
http://archives.neohapsis.com/archives/bugtraq/2000-10/0427.html
http://archives.neohapsis.com/archives/tru64/2000-q4/0000.html
http://www.calderasystems.com/support/security/advisories/CSSA-2000-030.0.txt
http://www.debian.org/security/2000/20000902
http://www.novell.com/linux/security/advisories/adv5_draht_glibc_txt.html
http://www.redhat.com/support/errata/RHSA-2000-057.html
http://www.securityfocus.com/bid/1634 Exploit Patch Vendor Advisory
http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000020.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/5176
ftp://patches.sgi.com/support/free/security/advisories/20000901-01-P
http://archives.neohapsis.com/archives/bugtraq/2000-08/0436.html
http://archives.neohapsis.com/archives/bugtraq/2000-08/0457.html Exploit Patch Vendor Advisory
http://archives.neohapsis.com/archives/bugtraq/2000-10/0427.html
http://archives.neohapsis.com/archives/tru64/2000-q4/0000.html
http://www.calderasystems.com/support/security/advisories/CSSA-2000-030.0.txt
http://www.debian.org/security/2000/20000902
http://www.novell.com/linux/security/advisories/adv5_draht_glibc_txt.html
http://www.redhat.com/support/errata/RHSA-2000-057.html
http://www.securityfocus.com/bid/1634 Exploit Patch Vendor Advisory
http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000020.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/5176
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:caldera:openlinux_ebuilder:3.0:*:*:*:*:*:*:*
cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:4.0es:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:4.1:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:4.2:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*
cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.3:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.0:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*
cpe:2.3:o:slackware:slackware_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:slackware:slackware_linux:7.1:*:*:*:*:*:*:*
cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:1.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:6.0.3:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:6.0.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:33

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20000901-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20000901-01-P -
References () http://archives.neohapsis.com/archives/bugtraq/2000-08/0436.html - () http://archives.neohapsis.com/archives/bugtraq/2000-08/0436.html -
References () http://archives.neohapsis.com/archives/bugtraq/2000-08/0457.html - Exploit, Patch, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2000-08/0457.html - Exploit, Patch, Vendor Advisory
References () http://archives.neohapsis.com/archives/bugtraq/2000-10/0427.html - () http://archives.neohapsis.com/archives/bugtraq/2000-10/0427.html -
References () http://archives.neohapsis.com/archives/tru64/2000-q4/0000.html - () http://archives.neohapsis.com/archives/tru64/2000-q4/0000.html -
References () http://www.calderasystems.com/support/security/advisories/CSSA-2000-030.0.txt - () http://www.calderasystems.com/support/security/advisories/CSSA-2000-030.0.txt -
References () http://www.debian.org/security/2000/20000902 - () http://www.debian.org/security/2000/20000902 -
References () http://www.novell.com/linux/security/advisories/adv5_draht_glibc_txt.html - () http://www.novell.com/linux/security/advisories/adv5_draht_glibc_txt.html -
References () http://www.redhat.com/support/errata/RHSA-2000-057.html - () http://www.redhat.com/support/errata/RHSA-2000-057.html -
References () http://www.securityfocus.com/bid/1634 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/1634 - Exploit, Patch, Vendor Advisory
References () http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000020.html - () http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000020.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/5176 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/5176 -

Information

Published : 2000-11-14 05:00

Updated : 2024-11-20 23:33


NVD link : CVE-2000-0844

Mitre link : CVE-2000-0844

CVE.ORG link : CVE-2000-0844


JSON object : View

Products Affected

caldera

  • openlinux
  • openlinux_eserver
  • openlinux_ebuilder

sun

  • sunos
  • solaris

trustix

  • secure_linux

conectiva

  • linux

ibm

  • aix

turbolinux

  • turbolinux

slackware

  • slackware_linux

mandrakesoft

  • mandrake_linux

sgi

  • irix

debian

  • debian_linux

redhat

  • linux

suse

  • suse_linux

immunix

  • immunix
CWE
CWE-264

Permissions, Privileges, and Access Controls