First published: Tue Jan 09 2001(Updated: )
restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =6.2 | |
Red Hat Linux | =6.2e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-1125 is considered a high severity vulnerability due to its ability to allow local users to gain root privileges.
To mitigate CVE-2000-1125, you should upgrade to a version of Red Hat Linux that does not utilize the vulnerable RSH environmental variable or apply the relevant security patches.
CVE-2000-1125 affects Red Hat Linux version 6.2 and 6.2e.
CVE-2000-1125 can be exploited by a local user through manipulation of the RSH variable, potentially leading to execution of malicious code.
Although CVE-2000-1125 was disclosed over two decades ago, it remains a concern for systems still running the affected versions of Red Hat Linux.