CVE-2001-0142
https://notcve.org/view.php?id=CVE-2001-0142
squid 2.3 and earlier allows local users to overwrite arbitrary files via a symlink attack in some configurations. • http://archives.neohapsis.com/archives/bugtraq/2001-01/0212.html http://marc.info/?l=bugtraq&m=97916374410647&w=2 http://www.debian.org/security/2001/dsa-019 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-003.php3 http://www.securityfocus.com/bid/2184 https://exchange.xforce.ibmcloud.com/vulnerabilities/5921 •
CVE-2001-0117
https://notcve.org/view.php?id=CVE-2001-0117
sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack. • http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2000-70-028-01 http://marc.info/?l=bugtraq&m=97916374410647&w=2 http://www.kb.cert.org/vuls/id/579928 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-008.php3 http://www.redhat.com/support/errata/RHSA-2001-116.html http://www.securityfocus.com/bid/2191 https://exchange.xforce.ibmcloud.com/vulnerabilities/5914 https://access.redhat.com/security/cve/CVE-2001-0117 https://bugzilla.redhat.com/show_bug •
CVE-2000-0917 – LPRng (RedHat 7.0) - 'lpd' Format String
https://notcve.org/view.php?id=CVE-2000-0917
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/227 https://www.exploit-db.com/exploits/230 https://www.exploit-db.com/exploits/226 https://www.exploit-db.com/exploits/16842 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:56.lprng.asc http://archives.neohapsis.com/archives/bugtraq/2000-09/0293.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-033.0.txt http://www.cert.org/advisories/CA-2000-22.html http://www.redhat.com/support/errata/RH •
CVE-2000-1009 – dump 0.4b15 (RedHat 6.2) - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-1009
dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program. • https://www.exploit-db.com/exploits/206 https://www.exploit-db.com/exploits/193 http://archives.neohapsis.com/archives/bugtraq/2000-10/0438.html http://www.securityfocus.com/bid/1871 https://exchange.xforce.ibmcloud.com/vulnerabilities/5437 •
CVE-2000-0867
https://notcve.org/view.php?id=CVE-2000-0867
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-032.0.txt http://archives.neohapsis.com/archives/bugtraq/2000-09/0193.html http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:050 http://marc.info/?l=bugtraq&m=97726239017741&w=2 http://www.novell.com/linux/security/advisories/adv9_draht_syslogd_txt.html http://www.osvdb.org/5824 http://www.redhat.com/support/errata/RHSA-2000-061.html http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000 •