CVE-2000-0172

The mtr program only uses a seteuid call when attempting to drop privileges, which could allow local users to gain root privileges.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:matt_kimball_and_roger_wolff:mtr:0.28:*:*:*:*:*:*:*
cpe:2.3:a:matt_kimball_and_roger_wolff:mtr:0.41:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:turbolinux:turbolinux:3.5b2:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2000-03-03 05:00

Updated : 2024-02-28 10:24


NVD link : CVE-2000-0172

Mitre link : CVE-2000-0172

CVE.ORG link : CVE-2000-0172


JSON object : View

Products Affected

matt_kimball_and_roger_wolff

  • mtr

turbolinux

  • turbolinux