First published: Tue Jan 09 2001(Updated: )
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Conectiva Linux | =4.2 | |
Conectiva Linux | =4.1 | |
Conectiva Linux | =5.1 | |
Immunix | =6.2 | |
Conectiva Linux | =4.0es | |
Conectiva Linux | =5.0 | |
Conectiva Linux | =4.0 | |
Mandrake Linux | =7.2 | |
HPE HP-UX | =11.11 | |
Mandrake Linux | =7.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
Mandrake Linux | =7.1 | |
SCO OpenLinux Server | ||
Red Hat Linux | =5.2 | |
Mandrake Linux | =6.0 | |
SCO OpenLinux Server | =2.3 | |
Red Hat Linux | =6.2e | |
SUSE Linux | =7.0 | |
Caldera OpenLinux eDesktop | =2.4 | |
Red Hat Linux | =6.0 | |
Mandrake Linux | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-1134 is classified as a vulnerability that can lead to local privilege escalation due to the symlink attack.
To fix CVE-2000-1134, it is recommended to update the affected shell programs to their latest secure versions that mitigate symlink processing.
CVE-2000-1134 affects various Unix systems, including tcsh, csh, sh, and bash across several distributions like Red Hat, Debian, and Mandrake.
A symlink attack in CVE-2000-1134 refers to a method where an attacker exploits the symlink processing by shell programs to overwrite other users' files.
Yes, CVE-2000-1134 can potentially allow local users to gain unauthorized access to files of other users by exploiting the symlink vulnerability.