
CVE-2000-0917 – LPRng (RedHat 7.0) - 'lpd' Format String
https://notcve.org/view.php?id=CVE-2000-0917
19 Dec 2000 — Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/227 •

CVE-2000-1009 – dump 0.4b15 (RedHat 6.2) - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-1009
29 Nov 2000 — dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program. • https://www.exploit-db.com/exploits/206 •

CVE-2000-0844 – Immunix OS 6.2 - LC glibc format string
https://notcve.org/view.php?id=CVE-2000-0844
14 Nov 2000 — Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. • https://www.exploit-db.com/exploits/20187 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2000-0867
https://notcve.org/view.php?id=CVE-2000-0867
14 Nov 2000 — Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-032.0.txt •

CVE-2000-0791
https://notcve.org/view.php?id=CVE-2000-0791
21 Sep 2000 — Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0179.html •

CVE-2000-0666 – Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String
https://notcve.org/view.php?id=CVE-2000-0666
16 Jul 2000 — rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/20075 •