Vulnerability Name: | CVE-2000-1009 (CCN-5437) | ||||||||
Assigned: | 2000-10-31 | ||||||||
Published: | 2000-10-31 | ||||||||
Updated: | 2017-12-19 | ||||||||
Summary: | dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: BUGTRAQ Type: UNKNOWN 20001030 Redhat 6.2 dump command executes external program with suid priviledge. Source: CCN Type: BugTraq Mailing List, Mon Oct 30 2000 - 23:37:35 CST Redhat 6.2 dump command executes external program with suid priviledge. Source: CCN Type: BugTraq Mailing List, Fri Nov 03 2000 - 05:39:33 CST Trustix Security Advisory - dump Source: MITRE Type: CNA CVE-2000-1009 Source: CCN Type: US-CERT VU#153653 Linux dump uses environment variables insecurely, allowing for root compromise Source: CCN Type: Linux-Mandrake Security Update Advisory MDKSA-2000:065 dump Source: CCN Type: OSVDB ID: 13747 Red Hat Linux dump RSH Environment Variable Subversion Privilege Escalation Source: BID Type: Exploit, Patch, Vendor Advisory 1871 Source: CCN Type: BID-1871 Multiple Vendor dump Insecure Environment Variables Vulnerability Source: XF Type: UNKNOWN linux-dump-execute-code(5437) Source: XF Type: UNKNOWN linux-dump-execute-code(5437) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |