FKIE_CVE-2000-0096

Vulnerability from fkie_nvd - Published: 2000-01-26 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.
Impacted products
Vendor Product Version
qualcomm qpopper 3.0
qualcomm qpopper 3.0beta1
qualcomm qpopper 3.0beta2
qualcomm qpopper 3.0beta3
qualcomm qpopper 3.0beta4
qualcomm qpopper 3.0beta5
qualcomm qpopper 3.0beta6
qualcomm qpopper 3.0beta7
qualcomm qpopper 3.0beta8
qualcomm qpopper 3.0beta9
qualcomm qpopper 3.0beta10
qualcomm qpopper 3.0beta11
qualcomm qpopper 3.0beta12
qualcomm qpopper 3.0beta13
qualcomm qpopper 3.0beta14
qualcomm qpopper 3.0beta15
qualcomm qpopper 3.0beta16
qualcomm qpopper 3.0beta17
qualcomm qpopper 3.0beta18
qualcomm qpopper 3.0beta19
qualcomm qpopper 3.0beta20
qualcomm qpopper 3.0beta21
qualcomm qpopper 3.0beta22
qualcomm qpopper 3.0beta23
qualcomm qpopper 3.0beta24
qualcomm qpopper 3.0beta25
qualcomm qpopper 3.0beta26
qualcomm qpopper 3.0beta27
qualcomm qpopper 3.0beta28
qualcomm qpopper 3.0beta29

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1208414-D175-41E2-BCBC-9E5EDBC41FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6535E515-B0FF-4FC6-8BCC-AF8EAEDCE099",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6586A031-B6B9-4EC0-B6B7-82BBFA4AA562",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5364920-D969-4585-A822-E26846CF7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9781C125-7E2B-41BB-A4B3-2317C3B95CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta5:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CE4256-F1D2-49A5-B7D7-25FC9111BB61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta6:*:*:*:*:*:*:*",
              "matchCriteriaId": "91310B66-9AAC-44EC-A0CC-3455DB069C17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA8F10C-8C06-45B6-898E-4592FE903CB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE692FF-40D9-4CE5-93A5-04082E281202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C0F200-2DB9-4492-95C8-72772B5EC6DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E84B8226-E4DA-4BDE-AC48-9B8999853D49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC2EC10-3396-4C73-A5C5-7280F710A4EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5314989E-4D5D-4A76-A1C1-6B9786142C05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A01E055E-9B9F-42AF-A531-0B783DED5AC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAEDEE2A-15DA-4D2D-BF03-5417B0243382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta15:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9BBB17-7B0A-4ACD-95DF-D0B1D40F8C2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4248800A-6F2D-47EC-A62C-0E89DE89153B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8249A1D-95D9-4205-9346-3110E250295C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37B76A4-E760-45B1-90FF-C97327A28A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta19:*:*:*:*:*:*:*",
              "matchCriteriaId": "33430029-28D1-4E4F-B4B7-D2E7EB4D97E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C5CDE8-34FB-4AB4-A49D-5D701996CA3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta21:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863B32-5742-4FAB-B49D-B6A771F90FE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A471EFDD-0618-4294-A1C0-4D37E794E3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta23:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF088417-1645-4F40-802D-143433FACE4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta24:*:*:*:*:*:*:*",
              "matchCriteriaId": "6802F665-8457-44C8-A3F0-91B318BE1014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta25:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EBE0FA1-7BBE-49AA-AA2B-77C60EDA20AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta26:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCA23E68-E974-49A0-BDB0-AFB3A69D271D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta27:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B5D240-F160-4419-AD95-577274D640B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta28:*:*:*:*:*:*:*",
              "matchCriteriaId": "9843924C-1511-489E-A222-C32113DDB080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta29:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F4369F-1ED0-4CCB-ABFE-D402E5A7599B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command."
    }
  ],
  "id": "CVE-2000-0096",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-01-26T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/948"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/948"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…