Описание
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2000-0867
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5259
- http://archives.neohapsis.com/archives/bugtraq/2000-09/0193.html
- http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:050
- http://marc.info/?l=bugtraq&m=97726239017741&w=2
- http://www.novell.com/linux/security/advisories/adv9_draht_syslogd_txt.html
- http://www.osvdb.org/5824
- http://www.redhat.com/support/errata/RHSA-2000-061.html
- http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000023.html
EPSS
Процентиль: 22%
0.00071
Низкий
CVE ID
Связанные уязвимости
redhat
почти 25 лет назад
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
nvd
больше 24 лет назад
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
EPSS
Процентиль: 22%
0.00071
Низкий