First published: Tue May 02 2000(Updated: )
The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =6.1 | |
SUSE Linux | =6.1-alpha | |
SUSE Linux | =6.2 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.3-alpha | |
SUSE Linux | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0433 is considered a medium severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2000-0433, administrators should change the home directory of the affected system accounts from /tmp to a secure location.
CVE-2000-0433 affects various versions of SUSE Linux, specifically versions 6.1, 6.2, 6.3, and 6.4.
The vulnerability in CVE-2000-0433 arises from the default configuration of certain system accounts having their home directories set to /tmp.
CVE-2000-0433 cannot be exploited remotely as it requires local access to the affected system.