First published: Wed May 03 2000(Updated: )
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0378 is classified as a medium-severity vulnerability, as it allows a user to sniff activity from devices after logging out.
To fix CVE-2000-0378, ensure that the pam_console module is properly configured to manage device ownership securely during user sessions.
CVE-2000-0378 affects Red Hat Linux versions 6.0, 6.1, and 6.2.
CVE-2000-0378 allows a user to potentially monitor the activities of subsequent users, which can lead to unauthorized information access.
While CVE-2000-0378 was reported over two decades ago, it remains important for understanding historical vulnerabilities in legacy systems.