Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0192: The default installation of Caldera OpenLinux 2.3 includes the CGI program rpm_query, which allows r

0
Medium
VulnerabilityCVE-2000-0192cve-2000-0192
Published: Sun Mar 05 2000 (03/05/2000, 05:00:00 UTC)
Source: NVD
Vendor/Project: caldera
Product: openlinux

Description

The default installation of Caldera OpenLinux 2.3 includes the CGI program rpm_query, which allows remote attackers to determine what packages are installed on the system.

AI-Powered Analysis

AILast updated: 07/01/2025, 00:25:00 UTC

Technical Analysis

CVE-2000-0192 is a medium-severity vulnerability affecting the default installation of Caldera OpenLinux 2.3. The vulnerability arises from the inclusion of a CGI program named rpm_query, which is accessible remotely and allows attackers to enumerate the packages installed on the affected system. This information disclosure vulnerability does not allow modification or disruption of system operations but leaks potentially sensitive configuration details. The CGI script rpm_query, when invoked remotely, returns a list of installed RPM packages, which can provide attackers with valuable intelligence about the software environment, including versions and presence of potentially vulnerable components. This reconnaissance capability can be leveraged as a preliminary step in a targeted attack, enabling adversaries to tailor exploits or identify further weaknesses. The vulnerability has a CVSS score of 5.0 (medium severity) with the vector AV:N/AC:L/Au:N/C:P/I:N/A:N, indicating it is remotely exploitable over the network without authentication, requires low attack complexity, and impacts confidentiality by disclosing package information without affecting integrity or availability. No patches or fixes are available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the affected product (Caldera OpenLinux 2.3 was released around 2000), this vulnerability is primarily of historical interest but may still pose risks in legacy environments that continue to run this outdated distribution.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to information disclosure. Attackers gaining knowledge of installed packages can better understand the system's software landscape, potentially identifying outdated or vulnerable components to target in subsequent attacks. While the vulnerability itself does not allow direct compromise, it lowers the barrier for attackers to plan more effective intrusions. Organizations running legacy Caldera OpenLinux 2.3 systems—though rare—may be at risk of targeted reconnaissance. This could be particularly relevant for industrial control systems, research institutions, or niche environments where legacy Linux distributions persist. The disclosure of package information could facilitate lateral movement or privilege escalation if combined with other vulnerabilities. However, the overall impact on confidentiality, integrity, and availability is limited, and modern systems are not affected. The lack of patches means mitigation relies on system upgrades or disabling the vulnerable CGI script.

Mitigation Recommendations

Given the absence of an official patch, European organizations should prioritize upgrading from Caldera OpenLinux 2.3 to a supported and actively maintained Linux distribution to eliminate this vulnerability. If upgrading is not immediately feasible, organizations should disable or remove the rpm_query CGI program to prevent remote package enumeration. Restricting access to the CGI directory via network-level controls such as firewalls or web server configuration can also reduce exposure. Implementing strict access controls and monitoring web server logs for unusual requests to rpm_query can help detect reconnaissance attempts. Additionally, organizations should conduct thorough audits of legacy systems to identify any instances of Caldera OpenLinux 2.3 and assess the necessity of their continued operation. Where legacy systems must remain, isolating them within segmented network zones with limited external access will reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7df8cd

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 7/1/2025, 12:25:00 AM

Last updated: 2/7/2026, 11:36:52 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats