{ "id": "CVE-2000-0615", "sourceIdentifier": "cve@mitre.org", "published": "2000-07-19T04:00:00.000", "lastModified": "2017-10-10T01:29:12.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "LPRng 3.6.x improperly installs lpd as setuid root, which can allow local users to append lpd trace and logging messages to files." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1 }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "78D19CF2-C520-4856-901D-7D6FF6340971" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "DB4716C2-C1EC-4C11-976B-9162503293B2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "16A777F4-896E-4BC8-BC73-784F840D81B6" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "06C0C5A4-9AC7-4E53-8FC3-5C6A5914DA17" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "2DC570FD-4F30-4509-B449-540CDFDFC719" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "1B045A1F-4566-4DAB-8A1A-86933F85B8B9" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D20FC1D5-4CCA-456B-A152-29F0DA126CA2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "16DF8D2B-FEF8-47C5-9DAA-8DB92AE4B992" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "03E4468F-44BC-47BC-AE2A-082C4D69136D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "C9D03015-E0ED-4BF6-81C9-348A10693A34" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "36AB2CEF-2520-4B8B-9AEF-69DA08E38AE7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "A4ECCF42-64C9-4D6D-8086-05952DD17847" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "9FC3298E-0FB4-49B8-8610-82CF90DAFE7D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "14D76156-AC60-4669-8C3D-6CC8E7BE6900" }, { "vulnerable": true, "criteria": "cpe:2.3:o:astart_technologies:lprng:3.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "1D812A04-02FA-4521-9DF3-96A1DB731498" } ] } ] } ], "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0117.html", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/1447", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7361", "source": "cve@mitre.org" } ] }