Vulnerability Details : CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
Exploit prediction scoring system (EPSS) score for CVE-2000-0666
Probability of exploitation activity in the next 30 days: 8.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2000-0666
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2000-0666
-
http://www.securityfocus.com/bid/1480
Exploit;Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2000-043.html
-
http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html
Exploit;Patch;Vendor Advisory
-
http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html
-
http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html
-
http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/4939
-
http://www.cert.org/advisories/CA-2000-17.html
US Government Resource
-
http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt
Products affected by CVE-2000-0666
- cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:2.3:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:2.3:*:alpha:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:2.3:*:powerpc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:2.3:*:sparc:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:4.0es:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:4.1:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:4.2:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:1.0:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:*