CVE-2000-0172

The mtr program only uses a seteuid call when attempting to drop privileges, which could allow local users to gain root privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:matt_kimball_and_roger_wolff:mtr:0.28:*:*:*:*:*:*:*
cpe:2.3:a:matt_kimball_and_roger_wolff:mtr:0.41:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:turbolinux:turbolinux:3.5b2:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:31

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/1038 - () http://www.securityfocus.com/bid/1038 -

Information

Published : 2000-03-03 05:00

Updated : 2024-11-20 23:31


NVD link : CVE-2000-0172

Mitre link : CVE-2000-0172

CVE.ORG link : CVE-2000-0172


JSON object : View

Products Affected

matt_kimball_and_roger_wolff

  • mtr

turbolinux

  • turbolinux