Описание
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2000-0867
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5259
- http://archives.neohapsis.com/archives/bugtraq/2000-09/0193.html
- http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:050
- http://marc.info/?l=bugtraq&m=97726239017741&w=2
- http://www.novell.com/linux/security/advisories/adv9_draht_syslogd_txt.html
- http://www.osvdb.org/5824
- http://www.redhat.com/support/errata/RHSA-2000-061.html
- http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000023.html
EPSS
Процентиль: 22%
0.00071
Низкий
CVE ID
Связанные уязвимости
redhat
около 25 лет назад
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
nvd
почти 25 лет назад
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
EPSS
Процентиль: 22%
0.00071
Низкий