CVE-2000-0844 (CNNVD-200011-069)
中文标题:
HP-UX NLSPATH环境变量权限提升漏洞
英文标题:
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected fo...
漏洞描述
中文描述:
HP-UX 中的很多程序都使用libc库中的catopen()/catgets()等函数来显示本地化的信息。catopen()函数在检测到NLSPATH环境变量之后,会打开其指定的文件并从中读取消息。 然而,catopen()函数并没有对suid root程序使用NLSPATH变量进行限制,这允许本地攻击者通过设置NLSPATH变量指定自己构造的locale文件,当suid root程序将使用catopen()打开该消息文件并将其中的数据传递给*printf()函数时,就可能造成格式串漏洞。 任何使用catopen()/catgets()函数的suid root程序都可能受此漏洞影响,本地攻击者可以利用此漏洞获取root权限。 根据我们的测试,至少如下程序是受影响的: -r-sr-xr-x 1 root bin 45056 Nov 14 2000 /usr/bin/at -r-sr-xr-x 1 root bin 24576 Nov 14 2000 /usr/bin/crontab -r-sr-xr-x 1 root bin 45056 Nov 14 2000 /usr/bin/ct -r-sr-xr-x 1 root bin 36864 Apr 19 2001 /usr/bin/cu -r-sr-xr-x 1 root bin 20480 Nov 14 2000 /usr/lbin/exrecover -r-sr-xr-x 1 root bin 40960 Aug 16 2001 /usr/bin/lp -r-sr-sr-x 2 root mail 45056 Nov 14 2000 /usr/bin/mail -r-sr-xr-x 5 root bin 45056 Nov 14 2000 /usr/bin/passwd -r-sr-xr-x 1 root bin 24576 Nov 14 2000 /usr/bin/su -r-sr-xr-x 11 root bin 1921024 Nov 6 2001 /usr/sbin/swinstall -r-sr-xr-x 2 root bin 1028096 Nov 6 2001 /usr/sbin/swpackage
英文描述:
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| caldera | openlinux_ebuilder | 3.0 | - | - |
cpe:2.3:a:caldera:openlinux_ebuilder:3.0:*:*:*:*:*:*:*
|
| immunix | immunix | 6.2 | - | - |
cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*
|
| conectiva | linux | 4.0 | - | - |
cpe:2.3:o:conectiva:linux:4.0:*:*:*:*:*:*:*
|
| conectiva | linux | 4.0es | - | - |
cpe:2.3:o:conectiva:linux:4.0es:*:*:*:*:*:*:*
|
| conectiva | linux | 4.1 | - | - |
cpe:2.3:o:conectiva:linux:4.1:*:*:*:*:*:*:*
|
| conectiva | linux | 4.2 | - | - |
cpe:2.3:o:conectiva:linux:4.2:*:*:*:*:*:*:*
|
| conectiva | linux | 5.0 | - | - |
cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*
|
| conectiva | linux | 5.1 | - | - |
cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*
|
| sgi | irix | 6.2 | - | - |
cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*
|
| sgi | irix | 6.3 | - | - |
cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*
|
| sgi | irix | 6.4 | - | - |
cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*
|
| sgi | irix | 6.5 | - | - |
cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
|
| sgi | irix | 6.5.1 | - | - |
cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
|
| sgi | irix | 6.5.2m | - | - |
cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*
|
| sgi | irix | 6.5.3 | - | - |
cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*
|
| sgi | irix | 6.5.3f | - | - |
cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*
|
| sgi | irix | 6.5.3m | - | - |
cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*
|
| sgi | irix | 6.5.4 | - | - |
cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*
|
| sgi | irix | 6.5.6 | - | - |
cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*
|
| sgi | irix | 6.5.7 | - | - |
cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*
|
| sgi | irix | 6.5.8 | - | - |
cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*
|
| caldera | openlinux | * | - | - |
cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*
|
| caldera | openlinux_eserver | 2.3 | - | - |
cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*
|
| debian | debian_linux | 2.0 | - | - |
cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 2.1 | - | - |
cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*
|
| debian | debian_linux | 2.2 | - | - |
cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
|
| debian | debian_linux | 2.3 | - | - |
cpe:2.3:o:debian:debian_linux:2.3:*:*:*:*:*:*:*
|
| ibm | aix | 3.2 | - | - |
cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*
|
| ibm | aix | 3.2.4 | - | - |
cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*
|
| ibm | aix | 3.2.5 | - | - |
cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*
|
| ibm | aix | 4.0 | - | - |
cpe:2.3:o:ibm:aix:4.0:*:*:*:*:*:*:*
|
| ibm | aix | 4.1 | - | - |
cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*
|
| ibm | aix | 4.1.1 | - | - |
cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*
|
| ibm | aix | 4.1.2 | - | - |
cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*
|
| ibm | aix | 4.1.3 | - | - |
cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*
|
| ibm | aix | 4.1.4 | - | - |
cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*
|
| ibm | aix | 4.1.5 | - | - |
cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*
|
| ibm | aix | 4.2 | - | - |
cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*
|
| ibm | aix | 4.2.1 | - | - |
cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*
|
| ibm | aix | 4.3 | - | - |
cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*
|
| ibm | aix | 4.3.1 | - | - |
cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*
|
| ibm | aix | 4.3.2 | - | - |
cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*
|
| mandrakesoft | mandrake_linux | 7.0 | - | - |
cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*
|
| mandrakesoft | mandrake_linux | 7.1 | - | - |
cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
|
| redhat | linux | 5.0 | - | - |
cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*
|
| redhat | linux | 5.1 | - | - |
cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*
|
| redhat | linux | 5.2 | - | - |
cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*
|
| redhat | linux | 6.0 | - | - |
cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*
|
| redhat | linux | 6.1 | - | - |
cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*
|
| redhat | linux | 6.2 | - | - |
cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*
|
| slackware | slackware_linux | 7.0 | - | - |
cpe:2.3:o:slackware:slackware_linux:7.0:*:*:*:*:*:*:*
|
| slackware | slackware_linux | 7.1 | - | - |
cpe:2.3:o:slackware:slackware_linux:7.1:*:*:*:*:*:*:*
|
| sun | solaris | 2.6 | - | - |
cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
|
| sun | sunos | 5.0 | - | - |
cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*
|
| sun | sunos | 5.1 | - | - |
cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*
|
| sun | sunos | 5.2 | - | - |
cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*
|
| sun | sunos | 5.3 | - | - |
cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*
|
| sun | sunos | 5.4 | - | - |
cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*
|
| sun | sunos | 5.5 | - | - |
cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*
|
| sun | sunos | 5.5.1 | - | - |
cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
|
| sun | sunos | 5.7 | - | - |
cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
|
| sun | sunos | 5.8 | - | - |
cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
|
| suse | suse_linux | 6.1 | - | - |
cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*
|
| suse | suse_linux | 6.2 | - | - |
cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*
|
| suse | suse_linux | 6.3 | - | - |
cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
|
| suse | suse_linux | 6.4 | - | - |
cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*
|
| suse | suse_linux | 7.0 | - | - |
cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
|
| trustix | secure_linux | 1.0 | - | - |
cpe:2.3:o:trustix:secure_linux:1.0:*:*:*:*:*:*:*
|
| trustix | secure_linux | 1.1 | - | - |
cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
|
| turbolinux | turbolinux | 6.0 | - | - |
cpe:2.3:o:turbolinux:turbolinux:6.0:*:*:*:*:*:*:*
|
| turbolinux | turbolinux | 6.0.1 | - | - |
cpe:2.3:o:turbolinux:turbolinux:6.0.1:*:*:*:*:*:*:*
|
| turbolinux | turbolinux | 6.0.2 | - | - |
cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*
|
| turbolinux | turbolinux | 6.0.3 | - | - |
cpe:2.3:o:turbolinux:turbolinux:6.0.3:*:*:*:*:*:*:*
|
| turbolinux | turbolinux | 6.0.4 | - | - |
cpe:2.3:o:turbolinux:turbolinux:6.0.4:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
CVSS评分详情
AV:N/AC:L/Au:N/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2000-0844 |
2025-11-11 15:17:20 | 2025-11-11 07:32:12 |
| NVD | nvd_CVE-2000-0844 |
2025-11-11 14:50:25 | 2025-11-11 07:40:58 |
| CNNVD | cnnvd_CNNVD-200011-069 |
2025-11-11 15:08:39 | 2025-11-11 07:48:44 |
| EXPLOITDB | exploitdb_EDB-197 |
2025-11-11 15:05:48 | 2025-11-11 08:15:10 |
| EXPLOITDB | exploitdb_EDB-20185 |
2025-11-11 15:05:25 | 2025-11-11 08:15:26 |
| EXPLOITDB | exploitdb_EDB-20186 |
2025-11-11 15:05:48 | 2025-11-11 08:15:26 |
| EXPLOITDB | exploitdb_EDB-20187 |
2025-11-11 15:05:23 | 2025-11-11 08:15:26 |
| EXPLOITDB | exploitdb_EDB-20188 |
2025-11-11 15:05:48 | 2025-11-11 08:15:26 |
| EXPLOITDB | exploitdb_EDB-20189 |
2025-11-11 15:05:48 | 2025-11-11 08:15:26 |
| EXPLOITDB | exploitdb_EDB-20190 |
2025-11-11 15:05:48 | 2025-11-11 08:15:26 |
| EXPLOITDB | exploitdb_EDB-209 |
2025-11-11 15:05:25 | 2025-11-11 08:15:57 |
| EXPLOITDB | exploitdb_EDB-210 |
2025-11-11 15:05:48 | 2025-11-11 08:16:01 |
| EXPLOITDB | exploitdb_EDB-215 |
2025-11-11 15:05:25 | 2025-11-11 08:16:21 |
| EXPLOITDB | exploitdb_EDB-249 |
2025-11-11 15:05:25 | 2025-11-11 08:21:04 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 33 -> 35
- tags_count: 13 -> 14
查看详细变更
- references_count: 31 -> 33
- tags_count: 12 -> 13
查看详细变更
- references_count: 29 -> 31
查看详细变更
- references_count: 27 -> 29
- tags_count: 11 -> 12
查看详细变更
- references_count: 25 -> 27
- tags_count: 10 -> 11
查看详细变更
- references_count: 23 -> 25
- tags_count: 8 -> 10
查看详细变更
- references_count: 21 -> 23
查看详细变更
- references_count: 19 -> 21
- tags_count: 6 -> 8
查看详细变更
- references_count: 17 -> 19
查看详细变更
- references_count: 15 -> 17
- tags_count: 4 -> 6
查看详细变更
- references_count: 12 -> 15
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200011-069
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 10.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 74
- data_sources: ['cve'] -> ['cve', 'nvd']