ID CVE-2000-0995 Type cve Reporter NVD Modified 2018-05-02T21:29:09
Description
Format string vulnerability in OpenBSD yp_passwd program (and possibly other BSD-based operating systems) allows attackers to gain root privileges a malformed name.
{"osvdb": [{"lastseen": "2017-04-28T13:20:00", "bulletinFamily": "software", "description": "## Vulnerability Description\nOpenBSD contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered due to a flaw in the yp_passwd program, which could allow a malicious user to supply a malformed name to the printf() function. This flaw may lead to a loss of integrity.\n## Solution Description\nCurrently, there are no known workarounds or upgrades to correct this issue. However, OpenBSD has released a patch to address this vulnerability.\n## Short Description\nOpenBSD contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered due to a flaw in the yp_passwd program, which could allow a malicious user to supply a malformed name to the printf() function. This flaw may lead to a loss of integrity.\n## References:\nVendor Specific Solution URL: ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch\n[Vendor Specific Advisory URL](http://www.openbsd.com/errata27.html#format_strings)\nISS X-Force ID: 5635\n[CVE-2000-0995](https://vulners.com/cve/CVE-2000-0995)\n", "modified": "2000-10-04T00:00:00", "published": "2000-10-04T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:6125", "id": "OSVDB:6125", "type": "osvdb", "title": "OpenBSD yp_passwd Malformed Name Format String", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}