CVE-2000-0170 – RedHat 6.1 - 'man' Local Overflow / Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0170
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable. • https://www.exploit-db.com/exploits/255 https://www.exploit-db.com/exploits/19778 https://www.exploit-db.com/exploits/19779 http://www.securityfocus.com/bid/1011 •
CVE-2000-0195 – Corel Linux OS 1.0 - 'setxconf' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0195
setxconf in Corel Linux allows local users to gain root access via the -T parameter, which executes the user's .xserverrc file. • https://www.exploit-db.com/exploits/19765 http://archives.neohapsis.com/archives/bugtraq/2000-02/0323.html http://www.securityfocus.com/bid/1008 •
CVE-2000-0194 – Corel Linux OS 1.0 - buildxconfig
https://notcve.org/view.php?id=CVE-2000-0194
buildxconf in Corel Linux allows local users to modify or create arbitrary files via the -x or -f parameters. • https://www.exploit-db.com/exploits/19764 http://archives.neohapsis.com/archives/bugtraq/2000-02/0323.html http://www.securityfocus.com/bid/1007 •
CVE-2000-0048 – Corel Linux OS 1.0 - get_it PATH
https://notcve.org/view.php?id=CVE-2000-0048
get_it program in Corel Linux Update allows local users to gain root access by specifying an alternate PATH for the cp program. • https://www.exploit-db.com/exploits/19723 http://linux.corel.com/support/clos_patch1.htm http://www.securityfocus.com/bid/928 •
CVE-2000-1220 – BSD / Linux - 'lpr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P http://seclists.org/lists/bugtraq/2000/Jan/0116.html http://www.atstake.com/research/advisories/2000/lpd_advisory.txt http://www.debian.org/security/2000/20000109 http://www.kb.cert.org/vuls/id/39001 http://www.l0pht.com/advisories/lpd_advisory http://www.redhat.com/support/errata/RHSA-2000-002.html http://www.securityfocus.com/bid/927 https://exchange. •