fkie_cve-2000-0096
Vulnerability from fkie_nvd
Published
2000-01-26 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.
Impacted products
Vendor Product Version
qualcomm qpopper 3.0
qualcomm qpopper 3.0beta1
qualcomm qpopper 3.0beta2
qualcomm qpopper 3.0beta3
qualcomm qpopper 3.0beta4
qualcomm qpopper 3.0beta5
qualcomm qpopper 3.0beta6
qualcomm qpopper 3.0beta7
qualcomm qpopper 3.0beta8
qualcomm qpopper 3.0beta9
qualcomm qpopper 3.0beta10
qualcomm qpopper 3.0beta11
qualcomm qpopper 3.0beta12
qualcomm qpopper 3.0beta13
qualcomm qpopper 3.0beta14
qualcomm qpopper 3.0beta15
qualcomm qpopper 3.0beta16
qualcomm qpopper 3.0beta17
qualcomm qpopper 3.0beta18
qualcomm qpopper 3.0beta19
qualcomm qpopper 3.0beta20
qualcomm qpopper 3.0beta21
qualcomm qpopper 3.0beta22
qualcomm qpopper 3.0beta23
qualcomm qpopper 3.0beta24
qualcomm qpopper 3.0beta25
qualcomm qpopper 3.0beta26
qualcomm qpopper 3.0beta27
qualcomm qpopper 3.0beta28
qualcomm qpopper 3.0beta29



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1208414-D175-41E2-BCBC-9E5EDBC41FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6535E515-B0FF-4FC6-8BCC-AF8EAEDCE099",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6586A031-B6B9-4EC0-B6B7-82BBFA4AA562",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5364920-D969-4585-A822-E26846CF7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9781C125-7E2B-41BB-A4B3-2317C3B95CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta5:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CE4256-F1D2-49A5-B7D7-25FC9111BB61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta6:*:*:*:*:*:*:*",
              "matchCriteriaId": "91310B66-9AAC-44EC-A0CC-3455DB069C17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA8F10C-8C06-45B6-898E-4592FE903CB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE692FF-40D9-4CE5-93A5-04082E281202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C0F200-2DB9-4492-95C8-72772B5EC6DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E84B8226-E4DA-4BDE-AC48-9B8999853D49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC2EC10-3396-4C73-A5C5-7280F710A4EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5314989E-4D5D-4A76-A1C1-6B9786142C05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A01E055E-9B9F-42AF-A531-0B783DED5AC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAEDEE2A-15DA-4D2D-BF03-5417B0243382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta15:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9BBB17-7B0A-4ACD-95DF-D0B1D40F8C2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4248800A-6F2D-47EC-A62C-0E89DE89153B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8249A1D-95D9-4205-9346-3110E250295C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37B76A4-E760-45B1-90FF-C97327A28A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta19:*:*:*:*:*:*:*",
              "matchCriteriaId": "33430029-28D1-4E4F-B4B7-D2E7EB4D97E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C5CDE8-34FB-4AB4-A49D-5D701996CA3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta21:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863B32-5742-4FAB-B49D-B6A771F90FE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A471EFDD-0618-4294-A1C0-4D37E794E3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta23:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF088417-1645-4F40-802D-143433FACE4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta24:*:*:*:*:*:*:*",
              "matchCriteriaId": "6802F665-8457-44C8-A3F0-91B318BE1014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta25:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EBE0FA1-7BBE-49AA-AA2B-77C60EDA20AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta26:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCA23E68-E974-49A0-BDB0-AFB3A69D271D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta27:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B5D240-F160-4419-AD95-577274D640B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta28:*:*:*:*:*:*:*",
              "matchCriteriaId": "9843924C-1511-489E-A222-C32113DDB080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta29:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F4369F-1ED0-4CCB-ABFE-D402E5A7599B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command."
    }
  ],
  "id": "CVE-2000-0096",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-01-26T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/948"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/948"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…