7.2
CVSSv2

CVE-2000-0195

Published: 24/02/2000 Updated: 10/09/2008
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

setxconf in Corel Linux allows local users to gain root access via the -T parameter, which executes the user's .xserverrc file.

Vulnerable Product Search on Vulmon Subscribe to Product

corel linux 1.0

Exploits

source: wwwsecurityfocuscom/bid/1008/info A vulnerability exists in the setxconf utility, as shipped with Corel Linux 10 The -T option to setxconf will run xinit, which euid root xinit, when executed, will invoke the contents on ~/xserverrc A malicious user could therefore execute commands as root cat > ~/xserverrc echo "+ +" & ...