Skip to main content

CVE-2000-0192: The default installation of Caldera OpenLinux 2.3 includes the CGI program rpm_query, which allows r

Medium
VulnerabilityCVE-2000-0192cve-2000-0192
Published: Sun Mar 05 2000 (03/05/2000, 05:00:00 UTC)
Source: NVD
Vendor/Project: caldera
Product: openlinux

Description

The default installation of Caldera OpenLinux 2.3 includes the CGI program rpm_query, which allows remote attackers to determine what packages are installed on the system.

AI-Powered Analysis

AILast updated: 07/01/2025, 00:25:00 UTC

Technical Analysis

CVE-2000-0192 is a medium-severity vulnerability affecting the default installation of Caldera OpenLinux 2.3. The vulnerability arises from the inclusion of a CGI program named rpm_query, which is accessible remotely and allows attackers to enumerate the packages installed on the affected system. This information disclosure vulnerability does not allow modification or disruption of system operations but leaks potentially sensitive configuration details. The CGI script rpm_query, when invoked remotely, returns a list of installed RPM packages, which can provide attackers with valuable intelligence about the software environment, including versions and presence of potentially vulnerable components. This reconnaissance capability can be leveraged as a preliminary step in a targeted attack, enabling adversaries to tailor exploits or identify further weaknesses. The vulnerability has a CVSS score of 5.0 (medium severity) with the vector AV:N/AC:L/Au:N/C:P/I:N/A:N, indicating it is remotely exploitable over the network without authentication, requires low attack complexity, and impacts confidentiality by disclosing package information without affecting integrity or availability. No patches or fixes are available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the affected product (Caldera OpenLinux 2.3 was released around 2000), this vulnerability is primarily of historical interest but may still pose risks in legacy environments that continue to run this outdated distribution.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to information disclosure. Attackers gaining knowledge of installed packages can better understand the system's software landscape, potentially identifying outdated or vulnerable components to target in subsequent attacks. While the vulnerability itself does not allow direct compromise, it lowers the barrier for attackers to plan more effective intrusions. Organizations running legacy Caldera OpenLinux 2.3 systems—though rare—may be at risk of targeted reconnaissance. This could be particularly relevant for industrial control systems, research institutions, or niche environments where legacy Linux distributions persist. The disclosure of package information could facilitate lateral movement or privilege escalation if combined with other vulnerabilities. However, the overall impact on confidentiality, integrity, and availability is limited, and modern systems are not affected. The lack of patches means mitigation relies on system upgrades or disabling the vulnerable CGI script.

Mitigation Recommendations

Given the absence of an official patch, European organizations should prioritize upgrading from Caldera OpenLinux 2.3 to a supported and actively maintained Linux distribution to eliminate this vulnerability. If upgrading is not immediately feasible, organizations should disable or remove the rpm_query CGI program to prevent remote package enumeration. Restricting access to the CGI directory via network-level controls such as firewalls or web server configuration can also reduce exposure. Implementing strict access controls and monitoring web server logs for unusual requests to rpm_query can help detect reconnaissance attempts. Additionally, organizations should conduct thorough audits of legacy systems to identify any instances of Caldera OpenLinux 2.3 and assess the necessity of their continued operation. Where legacy systems must remain, isolating them within segmented network zones with limited external access will reduce risk.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df8cd

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 7/1/2025, 12:25:00 AM

Last updated: 7/26/2025, 7:32:52 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats