dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2000-11-29T05:00:00

Updated: 2017-12-18T21:57:01

Reserved: 2000-11-24T00:00:00


Link: CVE-2000-1009

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2000-12-11T05:00:00.000

Modified: 2017-12-19T02:29:13.207


Link: CVE-2000-1009

JSON object: View

cve-icon Redhat Information

No data.