Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2000-0230 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Linux

8 documents6 sources
Severity
7.2HIGHNVD
EPSS
0.1%
top 69.41%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 13
Latest updateApr 30

Description

Buffer overflow in imwheel allows local users to gain root privileges via the imwheel-solo script and a long HOME environmental variable.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages2 packages

â–¶NVDredhat/linux6.1, 6.2+1

🔴Vulnerability Details

2
GHSA
GHSA-m8qj-v452-38v9: Buffer overflow in imwheel allows local users to gain root privileges via the imwheel-solo script and a long HOME environmental variable↗2022-04-30
â–¶
CVEList
CVE-2000-0230: Buffer overflow in imwheel allows local users to gain root privileges via the imwheel-solo script and a long HOME environmental variable↗2000-06-02
â–¶

💥Exploits & PoCs

3
Exploit-DB
Microsoft Windows XP/2000 - TCP Connection Reset↗2004-04-22
â–¶
Exploit-DB
Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - 'imwheel' (1)↗2000-03-13
â–¶
Exploit-DB
Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - 'imwheel' (2)↗2000-03-13
â–¶

📋Vendor Advisories

1
Red Hat
security flaw↗2000-03-13
â–¶

💬Community

1
Bugzilla
CVE-2000-0230 security flaw↗2018-08-16
â–¶
CVE-2000-0230 — Halloween Linux vulnerability | cvebase