CVE-2000-0219 – RedHat Linux 6.0 - Single User Mode Authentication
https://notcve.org/view.php?id=CVE-2000-0219
Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt. • https://www.exploit-db.com/exploits/19763 http://www.securityfocus.com/bid/1005 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200002230248.NAA19185%40cairo.anu.edu.au https://kc.mcafee.com/corporate/index?page=content&id=SB10053 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2000-0093
https://notcve.org/view.php?id=CVE-2000-0093
An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0093 •
CVE-2000-0048 – Corel Linux OS 1.0 - get_it PATH
https://notcve.org/view.php?id=CVE-2000-0048
get_it program in Corel Linux Update allows local users to gain root access by specifying an alternate PATH for the cp program. • https://www.exploit-db.com/exploits/19723 http://linux.corel.com/support/clos_patch1.htm http://www.securityfocus.com/bid/928 •
CVE-2000-1221 – RedHat 6.1 / IRIX 6.5.18 - 'lpd' Command Execution
https://notcve.org/view.php?id=CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. • https://www.exploit-db.com/exploits/19722 ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P http://rhn.redhat.com/errata/RHSA-2000-002.html http://www.atstake.com/research/advisories/2000/lpd_advisory.txt http://www.debian.org/security/2000/20000109 http://www.kb.cert.org/vuls/id/30308 http://www.l0pht.com/advisories/lpd_advisory http://www.securityfocus.com/bid/927 https://exchange.xforce.ibmcloud.com/vulnerabilities/3840 •
CVE-2000-1220 – BSD / Linux - 'lpr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P http://seclists.org/lists/bugtraq/2000/Jan/0116.html http://www.atstake.com/research/advisories/2000/lpd_advisory.txt http://www.debian.org/security/2000/20000109 http://www.kb.cert.org/vuls/id/39001 http://www.l0pht.com/advisories/lpd_advisory http://www.redhat.com/support/errata/RHSA-2000-002.html http://www.securityfocus.com/bid/927 https://exchange. •