{"vuid":"VU#25701","idnumber":"25701","name":"Linux gpm daemon allows arbitrary file removal","keywords":["Linux","gpm"],"overview":"gpm version 1.19.2 and earlier are vulnerable due to a flaw that allows a local user to delete arbitrary files.","clean_desc":"gpm (General Purpose Mouse) is the program that lets you use the mouse in console mode when not using XWindows. It is usually included in Linux distributions, and can be started from the command line or in the startup script /etc/rc.d/rc.local. A vulnerability in gpm version 1.19.2 and earlier allows local users to delete arbitrary files.","impact":"A user with console access can use this vulnerability to delete any file of his choosing.","resolution":"Upgrade to gpm version 1.19.3 or later.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Andy Moore.","public":["http://www.securityfocus.com/bid/1512","http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2000-0667","http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000240","http://marc.theaimsgroup.com/?l=bugtraq&m=96473014104340&w=2","http://archives.neohapsis.com/archives/bugtraq/2000-07/0396.html","http://www.caldera.com/support/security/advisories/CSSA-2000-024.0.txt","http://marc.theaimsgroup.com/?l=bugtraq&m=96480812908563&w=2","http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-025.php3?dis=6.0","http://www.redhat.com/support/errata/RHSA-2000-045-01.html"],"cveids":["CVE-2000-0667"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2000-08-10T15:33:55Z","publicdate":"2000-07-27T00:00:00Z","datefirstpublished":"2001-05-25T18:23:29Z","dateupdated":"2002-09-13T17:21:23Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"5","cam_scorecurrent":"3.0375","cam_scorecurrentwidelyknown":"3.88125","cam_scorecurrentwidelyknownexploited":"7.25625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.0375,"vulnote":null}