CVE-2000-1009

Current Description

dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.

Basic Data

PublishedDecember 11, 2000
Last ModifiedDecember 19, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSRedhatLinux6.2*******
    2.3OSTrustixSecure Linux1.1*******

Vulnerable Software List

VendorProductVersions
Redhat Linux 6.2
Trustix Secure Linux 1.1

References

NameSourceURLTags
20001030 Redhat 6.2 dump command executes external program with suid priviledge.http://archives.neohapsis.com/archives/bugtraq/2000-10/0438.htmlBUGTRAQ
1871http://www.securityfocus.com/bid/1871BIDExploit Patch Vendor Advisory
linux-dump-execute-code(5437)https://exchange.xforce.ibmcloud.com/vulnerabilities/5437XF