CVE-2000-1125

restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.2e:*:*:*:*:*:*:*

History

20 Nov 2024, 23:34

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=97336034309944&w=2 - () http://marc.info/?l=bugtraq&m=97336034309944&w=2 -
References () http://www.securityfocus.com/bid/1914 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/1914 - Exploit, Vendor Advisory

Information

Published : 2001-01-09 05:00

Updated : 2024-11-20 23:34


NVD link : CVE-2000-1125

Mitre link : CVE-2000-1125

CVE.ORG link : CVE-2000-1125


JSON object : View

Products Affected

redhat

  • linux