First published: Wed Nov 29 2000(Updated: )
dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trustix Secure Linux | =1.1 | |
Red Hat Linux | =6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-1009 has a moderate severity rating due to its potential to allow local users to escalate privileges.
To fix CVE-2000-1009, you should ensure that the RSH environmental variable is not trusted by implementing stricter security policies.
CVE-2000-1009 affects users of Red Hat Linux 6.2 and Trustix Secure Linux 1.1.
CVE-2000-1009 is a local privilege escalation vulnerability due to improper handling of environmental variables.
CVE-2000-1009 cannot be exploited remotely as it requires local access to the affected systems.