Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2000-0666

13 documents7 sources
Severity
10.0CRITICAL
EPSS
34.6%
top 3.00%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 16
Latest updateApr 30

Description

rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages4 packages

NVDredhat/linux6.0, 6.1, 6.2+2
NVDconectiva/linux6 versions+5
NVDsuse/suse_linux6.3, 6.4, 7.0+2
NVDtrustix/secure_linux1.0, 1.1+1

Also affects: Debian Linux 2.2, 2.3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jc43-58xv-97mp: rpc2022-04-30
CVEList
CVE-2000-0666: rpc2000-10-13

💥Exploits & PoCs

3
Exploit-DB
Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (3)2000-08-03
Exploit-DB
Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (2)2000-08-01
Exploit-DB
Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (1)2000-07-16

🔍Detection Rules

4
Suricata
GPL RPC STATD UDP monitor mon_name format string exploit attempt2010-09-23
Suricata
GPL RPC STATD TCP monitor mon_name format string exploit attempt2010-09-23
Suricata
GPL RPC STATD UDP stat mon_name format string exploit attempt2010-09-23
Suricata
GPL RPC STATD TCP stat mon_name format string exploit attempt2010-09-23

📋Vendor Advisories

2
Red Hat
security flaw2000-07-16
Red Hat
CVE-2000-0800: String parsing error in rpc

💬Community

1
Bugzilla
CVE-2000-0666 security flaw2018-08-16
CVE-2000-0666 (CRITICAL CVSS 10) | rpc.statd in the nfs-utils package | cvebase.io