Описание
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2000-0751
- http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html
- http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html
- http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h
- http://www.openbsd.org/errata.html#mopd
- http://www.redhat.com/support/errata/RHSA-2000-050.html
- http://www.securityfocus.com/bid/1559
EPSS
Процентиль: 95%
0.17701
Средний
CVE ID
Связанные уязвимости
redhat
почти 25 лет назад
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.
nvd
почти 25 лет назад
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.
EPSS
Процентиль: 95%
0.17701
Средний