CVE-2000-0666 – Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String
https://notcve.org/view.php?id=CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/20075 https://www.exploit-db.com/exploits/20076 https://www.exploit-db.com/exploits/20077 http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt http://www.cert. •
CVE-2000-0607 – Mandrake 7.0/7.1 / RedHat Kon2 0.3.9 - '/usr/bin/fld' Input File Overflow
https://notcve.org/view.php?id=CVE-2000-0607
Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings. • https://www.exploit-db.com/exploits/20024 http://www.securityfocus.com/bid/1371 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.21.0006192340340.19998-100000%40ferret.lmh.ox.ac.uk •
CVE-2000-0606
https://notcve.org/view.php?id=CVE-2000-0606
Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter. • http://www.securityfocus.com/bid/1371 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.21.0006192340340.19998-100000%40ferret.lmh.ox.ac.uk •
CVE-2000-0170 – RedHat 6.1 - 'man' Local Overflow / Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0170
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable. • https://www.exploit-db.com/exploits/255 https://www.exploit-db.com/exploits/19778 https://www.exploit-db.com/exploits/19779 http://www.securityfocus.com/bid/1011 •
CVE-2000-1221 – RedHat 6.1 / IRIX 6.5.18 - 'lpd' Command Execution
https://notcve.org/view.php?id=CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. • https://www.exploit-db.com/exploits/19722 ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P http://rhn.redhat.com/errata/RHSA-2000-002.html http://www.atstake.com/research/advisories/2000/lpd_advisory.txt http://www.debian.org/security/2000/20000109 http://www.kb.cert.org/vuls/id/30308 http://www.l0pht.com/advisories/lpd_advisory http://www.securityfocus.com/bid/927 https://exchange.xforce.ibmcloud.com/vulnerabilities/3840 •