First published: Wed Nov 29 2000(Updated: )
dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trustix Secure Linux | =1.1 | |
Redhat Linux | =6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.