CVE-2000-0531: Linux gpm program allows local users to cause a denial of service by flooding the /dev/gpmctl device
Linux gpm program allows local users to cause a denial of service by flooding the /dev/gpmctl device with STREAM sockets.
AI Analysis
Technical Summary
CVE-2000-0531 is a vulnerability found in the Linux gpm (General Purpose Mouse) program, specifically affecting versions 2.3, 2.4, 6.0, and 6.1 of Caldera's OpenLinux distribution. The vulnerability allows local users to cause a denial of service (DoS) by flooding the /dev/gpmctl device with STREAM sockets. The /dev/gpmctl device is used by the gpm daemon to handle mouse input events in console environments. By overwhelming this device interface with excessive STREAM socket connections, an attacker can exhaust system resources or cause the gpm daemon to become unresponsive, effectively denying legitimate users access to mouse input functionality in the console. This vulnerability requires local access to the system, meaning an attacker must already have some level of user access to exploit it. The CVSS score assigned is 2.1 (low severity), reflecting that the impact is limited to availability (denial of service), with no impact on confidentiality or integrity, and that exploitation does not require elevated privileges but does require local access. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of this vulnerability (published in 1999) and the specific affected product versions, modern Linux distributions are unlikely to be affected. However, legacy systems or specialized environments still running these versions could be vulnerable.
Potential Impact
For European organizations, the impact of this vulnerability is generally low due to its requirement for local access and the limited scope of affected systems (older Caldera OpenLinux versions). However, in environments where legacy systems are still in use—such as industrial control systems, research institutions, or organizations with long-lived infrastructure—this vulnerability could be exploited by an insider or a compromised local user to disrupt console mouse input. This could hinder administrative tasks or user operations relying on console mouse functionality, potentially delaying incident response or system management. While the denial of service does not compromise data confidentiality or integrity, availability disruptions in critical systems can have operational consequences. The lack of a patch means organizations must rely on compensating controls or system upgrades to mitigate risk.
Mitigation Recommendations
Given the absence of an official patch, European organizations should consider the following specific mitigation strategies: 1) Restrict local access strictly to trusted users and enforce strong authentication and access control policies to minimize the risk of exploitation by unauthorized local users. 2) Monitor and audit local user activities to detect unusual attempts to open excessive STREAM sockets or interact with /dev/gpmctl. 3) Where possible, disable the gpm service if mouse input in console environments is not required, thereby eliminating the attack surface. 4) Upgrade legacy systems to modern Linux distributions that do not include this vulnerability or have patched it. 5) Use kernel-level security modules or mandatory access control frameworks (e.g., SELinux, AppArmor) to restrict access to /dev/gpmctl device nodes. 6) Isolate legacy systems in network segments with limited access to reduce the risk of local user compromise. These measures go beyond generic advice by focusing on access control, monitoring, service configuration, and system modernization.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2000-0531: Linux gpm program allows local users to cause a denial of service by flooding the /dev/gpmctl device
Description
Linux gpm program allows local users to cause a denial of service by flooding the /dev/gpmctl device with STREAM sockets.
AI-Powered Analysis
Technical Analysis
CVE-2000-0531 is a vulnerability found in the Linux gpm (General Purpose Mouse) program, specifically affecting versions 2.3, 2.4, 6.0, and 6.1 of Caldera's OpenLinux distribution. The vulnerability allows local users to cause a denial of service (DoS) by flooding the /dev/gpmctl device with STREAM sockets. The /dev/gpmctl device is used by the gpm daemon to handle mouse input events in console environments. By overwhelming this device interface with excessive STREAM socket connections, an attacker can exhaust system resources or cause the gpm daemon to become unresponsive, effectively denying legitimate users access to mouse input functionality in the console. This vulnerability requires local access to the system, meaning an attacker must already have some level of user access to exploit it. The CVSS score assigned is 2.1 (low severity), reflecting that the impact is limited to availability (denial of service), with no impact on confidentiality or integrity, and that exploitation does not require elevated privileges but does require local access. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of this vulnerability (published in 1999) and the specific affected product versions, modern Linux distributions are unlikely to be affected. However, legacy systems or specialized environments still running these versions could be vulnerable.
Potential Impact
For European organizations, the impact of this vulnerability is generally low due to its requirement for local access and the limited scope of affected systems (older Caldera OpenLinux versions). However, in environments where legacy systems are still in use—such as industrial control systems, research institutions, or organizations with long-lived infrastructure—this vulnerability could be exploited by an insider or a compromised local user to disrupt console mouse input. This could hinder administrative tasks or user operations relying on console mouse functionality, potentially delaying incident response or system management. While the denial of service does not compromise data confidentiality or integrity, availability disruptions in critical systems can have operational consequences. The lack of a patch means organizations must rely on compensating controls or system upgrades to mitigate risk.
Mitigation Recommendations
Given the absence of an official patch, European organizations should consider the following specific mitigation strategies: 1) Restrict local access strictly to trusted users and enforce strong authentication and access control policies to minimize the risk of exploitation by unauthorized local users. 2) Monitor and audit local user activities to detect unusual attempts to open excessive STREAM sockets or interact with /dev/gpmctl. 3) Where possible, disable the gpm service if mouse input in console environments is not required, thereby eliminating the attack surface. 4) Upgrade legacy systems to modern Linux distributions that do not include this vulnerability or have patched it. 5) Use kernel-level security modules or mandatory access control frameworks (e.g., SELinux, AppArmor) to restrict access to /dev/gpmctl device nodes. 6) Isolate legacy systems in network segments with limited access to reduce the risk of local user compromise. These measures go beyond generic advice by focusing on access control, monitoring, service configuration, and system modernization.
Affected Countries
Threat ID: 682ca32cb6fd31d6ed7df431
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 7/1/2025, 1:41:15 PM
Last updated: 2/7/2026, 10:13:43 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowCVE-2026-25724: CWE-61: UNIX Symbolic Link (Symlink) Following in anthropics claude-code
LowCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.