CVE-2000-0192: The default installation of Caldera OpenLinux 2.3 includes the CGI program rpm_query, which allows r
The default installation of Caldera OpenLinux 2.3 includes the CGI program rpm_query, which allows remote attackers to determine what packages are installed on the system.
AI Analysis
Technical Summary
CVE-2000-0192 is a medium-severity vulnerability affecting the default installation of Caldera OpenLinux 2.3. The vulnerability arises from the inclusion of a CGI program named rpm_query, which is accessible remotely and allows attackers to enumerate the packages installed on the affected system. This information disclosure vulnerability does not allow modification or disruption of system operations but leaks potentially sensitive configuration details. The CGI script rpm_query, when invoked remotely, returns a list of installed RPM packages, which can provide attackers with valuable intelligence about the software environment, including versions and presence of potentially vulnerable components. This reconnaissance capability can be leveraged as a preliminary step in a targeted attack, enabling adversaries to tailor exploits or identify further weaknesses. The vulnerability has a CVSS score of 5.0 (medium severity) with the vector AV:N/AC:L/Au:N/C:P/I:N/A:N, indicating it is remotely exploitable over the network without authentication, requires low attack complexity, and impacts confidentiality by disclosing package information without affecting integrity or availability. No patches or fixes are available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the affected product (Caldera OpenLinux 2.3 was released around 2000), this vulnerability is primarily of historical interest but may still pose risks in legacy environments that continue to run this outdated distribution.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to information disclosure. Attackers gaining knowledge of installed packages can better understand the system's software landscape, potentially identifying outdated or vulnerable components to target in subsequent attacks. While the vulnerability itself does not allow direct compromise, it lowers the barrier for attackers to plan more effective intrusions. Organizations running legacy Caldera OpenLinux 2.3 systems—though rare—may be at risk of targeted reconnaissance. This could be particularly relevant for industrial control systems, research institutions, or niche environments where legacy Linux distributions persist. The disclosure of package information could facilitate lateral movement or privilege escalation if combined with other vulnerabilities. However, the overall impact on confidentiality, integrity, and availability is limited, and modern systems are not affected. The lack of patches means mitigation relies on system upgrades or disabling the vulnerable CGI script.
Mitigation Recommendations
Given the absence of an official patch, European organizations should prioritize upgrading from Caldera OpenLinux 2.3 to a supported and actively maintained Linux distribution to eliminate this vulnerability. If upgrading is not immediately feasible, organizations should disable or remove the rpm_query CGI program to prevent remote package enumeration. Restricting access to the CGI directory via network-level controls such as firewalls or web server configuration can also reduce exposure. Implementing strict access controls and monitoring web server logs for unusual requests to rpm_query can help detect reconnaissance attempts. Additionally, organizations should conduct thorough audits of legacy systems to identify any instances of Caldera OpenLinux 2.3 and assess the necessity of their continued operation. Where legacy systems must remain, isolating them within segmented network zones with limited external access will reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2000-0192: The default installation of Caldera OpenLinux 2.3 includes the CGI program rpm_query, which allows r
Description
The default installation of Caldera OpenLinux 2.3 includes the CGI program rpm_query, which allows remote attackers to determine what packages are installed on the system.
AI-Powered Analysis
Technical Analysis
CVE-2000-0192 is a medium-severity vulnerability affecting the default installation of Caldera OpenLinux 2.3. The vulnerability arises from the inclusion of a CGI program named rpm_query, which is accessible remotely and allows attackers to enumerate the packages installed on the affected system. This information disclosure vulnerability does not allow modification or disruption of system operations but leaks potentially sensitive configuration details. The CGI script rpm_query, when invoked remotely, returns a list of installed RPM packages, which can provide attackers with valuable intelligence about the software environment, including versions and presence of potentially vulnerable components. This reconnaissance capability can be leveraged as a preliminary step in a targeted attack, enabling adversaries to tailor exploits or identify further weaknesses. The vulnerability has a CVSS score of 5.0 (medium severity) with the vector AV:N/AC:L/Au:N/C:P/I:N/A:N, indicating it is remotely exploitable over the network without authentication, requires low attack complexity, and impacts confidentiality by disclosing package information without affecting integrity or availability. No patches or fixes are available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the affected product (Caldera OpenLinux 2.3 was released around 2000), this vulnerability is primarily of historical interest but may still pose risks in legacy environments that continue to run this outdated distribution.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to information disclosure. Attackers gaining knowledge of installed packages can better understand the system's software landscape, potentially identifying outdated or vulnerable components to target in subsequent attacks. While the vulnerability itself does not allow direct compromise, it lowers the barrier for attackers to plan more effective intrusions. Organizations running legacy Caldera OpenLinux 2.3 systems—though rare—may be at risk of targeted reconnaissance. This could be particularly relevant for industrial control systems, research institutions, or niche environments where legacy Linux distributions persist. The disclosure of package information could facilitate lateral movement or privilege escalation if combined with other vulnerabilities. However, the overall impact on confidentiality, integrity, and availability is limited, and modern systems are not affected. The lack of patches means mitigation relies on system upgrades or disabling the vulnerable CGI script.
Mitigation Recommendations
Given the absence of an official patch, European organizations should prioritize upgrading from Caldera OpenLinux 2.3 to a supported and actively maintained Linux distribution to eliminate this vulnerability. If upgrading is not immediately feasible, organizations should disable or remove the rpm_query CGI program to prevent remote package enumeration. Restricting access to the CGI directory via network-level controls such as firewalls or web server configuration can also reduce exposure. Implementing strict access controls and monitoring web server logs for unusual requests to rpm_query can help detect reconnaissance attempts. Additionally, organizations should conduct thorough audits of legacy systems to identify any instances of Caldera OpenLinux 2.3 and assess the necessity of their continued operation. Where legacy systems must remain, isolating them within segmented network zones with limited external access will reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32db6fd31d6ed7df8cd
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 7/1/2025, 12:25:00 AM
Last updated: 7/26/2025, 7:32:52 PM
Views: 10
Related Threats
CVE-2025-8452: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in Brother Industries, Ltd HL-L8260CDN
MediumCVE-2025-5468: CWE-61: UNIX Symbolic Link in Ivanti Connect Secure
MediumCVE-2025-5466: CWE-776 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') in Ivanti Connect Secure
MediumCVE-2025-8310: CWE-862 Missing Authorization in Ivanti Virtual Application Delivery ControllerCWE-862
MediumCVE-2025-22834: CWE-665 Improper Initialization in AMI AptioV
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.