CVE-2000-0438 – S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-0438
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter. • https://www.exploit-db.com/exploits/19952 https://www.exploit-db.com/exploits/19953 https://www.exploit-db.com/exploits/19954 http://archives.neohapsis.com/archives/bugtraq/2000-05/0245.html http://www.securityfocus.com/bid/1239 •
CVE-2000-0433
https://notcve.org/view.php?id=CVE-2000-0433
The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles. • http://www.novell.com/linux/security/advisories/suse_security_announce_47.html •
CVE-2000-0293 – SuSE Linux 6.x - Arbitrary File Deletion
https://notcve.org/view.php?id=CVE-2000-0293
aaa_base in SuSE Linux 6.3, and cron.daily in earlier versions, allow local users to delete arbitrary files by creating files whose names include spaces, which are then incorrectly interpreted by aaa_base when it deletes expired files from the /tmp directory. • https://www.exploit-db.com/exploits/19867 http://www.securityfocus.com/bid/1130 •
CVE-2000-0229 – gpm 1.18.1/1.19 / Debian 2.x / RedHat 6.x / S.u.S.E 5.3/6.x - gpm Setgid
https://notcve.org/view.php?id=CVE-2000-0229
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root. • https://www.exploit-db.com/exploits/19816 http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html http://www.novell.com/linux/security/advisories/suse_security_announce_45.html http://www.redhat.com/support/errata/RHSA-2000-009.html http://www.redhat.com/support/errata/RHSA-2000-045.html http://www.securityfocus.com/bid/1069 •
CVE-2000-0231 – Halloween Linux 4.0 / SuSE Linux 6.0/6.1/6.2/6.3 - 'kreatecd' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0231
Linux kreatecd trusts a user-supplied path that is used to find the cdrecord program, allowing local users to gain root privileges. • https://www.exploit-db.com/exploits/19813 http://archives.neohapsis.com/archives/bugtraq/2000-03/0162.html http://www.securityfocus.com/bid/1061 •