CVE-2000-0433
https://notcve.org/view.php?id=CVE-2000-0433
The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles. • http://www.novell.com/linux/security/advisories/suse_security_announce_47.html •
CVE-2000-0340 – SuSE Linux 6.3/6.4 Gnomelib - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-0340
Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable. • https://www.exploit-db.com/exploits/19883 http://www.securityfocus.com/bid/1155 http://www.securityfocus.com/templates/archive.pike?list=1&msg=00042902575201.09597%40wintermute-pub http://www.suse.com/us/support/download/updates/axp_63.html •
CVE-2000-0293 – SuSE Linux 6.x - Arbitrary File Deletion
https://notcve.org/view.php?id=CVE-2000-0293
aaa_base in SuSE Linux 6.3, and cron.daily in earlier versions, allow local users to delete arbitrary files by creating files whose names include spaces, which are then incorrectly interpreted by aaa_base when it deletes expired files from the /tmp directory. • https://www.exploit-db.com/exploits/19867 http://www.securityfocus.com/bid/1130 •
CVE-2000-0229 – gpm 1.18.1/1.19 / Debian 2.x / RedHat 6.x / S.u.S.E 5.3/6.x - gpm Setgid
https://notcve.org/view.php?id=CVE-2000-0229
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root. • https://www.exploit-db.com/exploits/19816 http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html http://www.novell.com/linux/security/advisories/suse_security_announce_45.html http://www.redhat.com/support/errata/RHSA-2000-009.html http://www.redhat.com/support/errata/RHSA-2000-045.html http://www.securityfocus.com/bid/1069 •
CVE-2000-0231 – Halloween Linux 4.0 / SuSE Linux 6.0/6.1/6.2/6.3 - 'kreatecd' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0231
Linux kreatecd trusts a user-supplied path that is used to find the cdrecord program, allowing local users to gain root privileges. • https://www.exploit-db.com/exploits/19813 http://archives.neohapsis.com/archives/bugtraq/2000-03/0162.html http://www.securityfocus.com/bid/1061 •