Vulnerabilities > CVE-2000-1125 - Unspecified vulnerability in Redhat Linux 6.2/6.2E

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
redhat
exploit available

Summary

restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.

Vulnerable Configurations

Part Description Count
OS
Redhat
2

Exploit-Db

  • descriptionRedHat restore 0.4 b15 Insecure Environment Variables Vulnerability. CVE-2000-1125. Local exploit for linux platform
    idEDB-ID:20385
    last seen2016-02-02
    modified2000-11-04
    published2000-11-04
    reporterfish
    sourcehttps://www.exploit-db.com/download/20385/
    titleRedHat restore 0.4 b15 Insecure Environment Variables Vulnerability
  • descriptionRestore and Dump Local Exploit. CVE-2000-1125. Local exploit for linux platform
    idEDB-ID:184
    last seen2016-01-31
    modified2000-11-16
    published2000-11-16
    reporterTlabs
    sourcehttps://www.exploit-db.com/download/184/
    titleRestore and Dump Local Exploit
  • description/sbin/restore exploit (rh6.2). CVE-2000-1125. Local exploit for linux platform
    idEDB-ID:182
    last seen2016-01-31
    modified2000-11-16
    published2000-11-16
    reporterN/A
    sourcehttps://www.exploit-db.com/download/182/
    title/sbin/restore Exploit rh6.2