CVE-2000-0170 – RedHat 6.1 - 'man' Local Overflow / Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0170
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable. • https://www.exploit-db.com/exploits/255 https://www.exploit-db.com/exploits/19778 https://www.exploit-db.com/exploits/19779 http://www.securityfocus.com/bid/1011 •
CVE-2000-1220 – BSD / Linux - 'lpr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P http://seclists.org/lists/bugtraq/2000/Jan/0116.html http://www.atstake.com/research/advisories/2000/lpd_advisory.txt http://www.debian.org/security/2000/20000109 http://www.kb.cert.org/vuls/id/39001 http://www.l0pht.com/advisories/lpd_advisory http://www.redhat.com/support/errata/RHSA-2000-002.html http://www.securityfocus.com/bid/927 https://exchange. •
CVE-1999-0872
https://notcve.org/view.php?id=CVE-1999-0872
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file. • http://www.securityfocus.com/bid/611 http://www.securityfocus.com/bid/759 •
CVE-1999-0769 – Caldera OpenLinux 2.2 / Debian 2.1/2.2 / RedHat 6.0 - Vixie Cron MAILTO Sendmail
https://notcve.org/view.php?id=CVE-1999-0769
Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable. • https://www.exploit-db.com/exploits/19474 http://www.securityfocus.com/bid/611 •
CVE-2000-0118 – RedHat Linux 5.2 i386/6.0 - No Logging
https://notcve.org/view.php?id=CVE-2000-0118
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 http://marc.info/?l=bugtraq&m=94935300520617&w=2 •