Vulnerability Details : CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Exploit prediction scoring system (EPSS) score for CVE-2000-1220
Probability of exploitation activity in the next 30 days: 1.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 84 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2000-1220
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2000-1220
-
http://www.kb.cert.org/vuls/id/39001
US Government Resource
- http://www.securityfocus.com/bid/927
- http://www.l0pht.com/advisories/lpd_advisory
-
http://www.redhat.com/support/errata/RHSA-2000-002.html
- http://www.debian.org/security/2000/20000109
- http://www.atstake.com/research/advisories/2000/lpd_advisory.txt
- ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/3841
-
http://seclists.org/lists/bugtraq/2000/Jan/0116.html
Products affected by CVE-2000-1220
- cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*