CVE-2000-0668 : Detail

CVE-2000-0668

0.71%V3
Network
2000-10-13
02h00 +00:00
2004-09-02
07h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

pam_console PAM module in Linux systems allows a user to access the system console and reboot the system when a display manager such as gdm or kdm has XDMCP enabled.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 20105

Publication date : 2000-07-26 22h00 +00:00
Author : bkw1a
EDB Verified : Yes

source: https://www.securityfocus.com/bid/1513/info There is a vulnerability in the Linux pam_console module that could allow an attacker to remotely reboot the workstation or perform other actions limited to local users. If a workstation is configured to use a display manager (xdm, gdm, kdm, etc.) AND has XDMCP enabled, it is possible for a user who logs in remotely to use Xnest -query to log in on display :1, which is recognized as the system console. This vulnerability is only present if the workstation is running a graphical login manager such as gdm or kdm. This description of how to replicate the problem was posted to RedHat's Bugzilla bug-tracking system by [email protected]: 1. ssh into the server, allowing ssh to establish a secure forwarded X connection. If no one else is using display number 0, you'll end up with a DISPLAY value of "host:0.0". 2. Invoke "Xnest -query localhost" on the remote machine. 3. Log in, starting a Gnome session. 4. From the Gnome panel, select "logout". You'll be presented with the option of shutting down or rebooting the server. Another description, this one from Andreas Hasenack <[email protected]>: 1. login remotely (X -broadcast) (have gdm, kdm, whatever running with XDMCP enabled somewhere) 2. after login, start Xnest with -broadcast again, for example 3. login again, now you will be using display :1 4. this is treated as a console user, and commands only available to console users can be run, such as reboot.

Products Mentioned

Configuraton 0

Michael_k._johnson>>Pam_console >> Version 0.66

    Michael_k._johnson>>Pam_console >> Version 0.72_unpatched

      Conectiva>>Linux >> Version 4.0

      Conectiva>>Linux >> Version 4.0es

      Conectiva>>Linux >> Version 4.1

      Conectiva>>Linux >> Version 4.2

      Conectiva>>Linux >> Version 5.0

      Conectiva>>Linux >> Version 5.1

      Configuraton 0

      Redhat>>Linux >> Version 6.0

        Redhat>>Linux >> Version 6.0

          Redhat>>Linux >> Version 6.0

            Redhat>>Linux >> Version 6.1

              Redhat>>Linux >> Version 6.1

                Redhat>>Linux >> Version 6.1

                  Redhat>>Linux >> Version 6.2

                    Redhat>>Linux >> Version 6.2

                      Redhat>>Linux >> Version 6.2

                        References

                        http://www.securityfocus.com/bid/1513
                        Tags : vdb-entry, x_refsource_BID
                        http://www.redhat.com/support/errata/RHSA-2000-044.html
                        Tags : vendor-advisory, x_refsource_REDHAT