Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2000-1009Redhat Linux vulnerability

6 documents4 sources
Severity
7.2HIGHNVD
EPSS
0.3%
top 43.21%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 11
Latest updateApr 30

Description

dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages2 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jph8-qvmw-2p95: dump in Red Hat Linux 62022-04-30
CVEList
CVE-2000-1009: dump in Red Hat Linux 62000-11-29

💥Exploits & PoCs

3
Exploit-DB
dump 0.4b15 (RedHat 6.2) - Local Privilege Escalation2000-11-29
Exploit-DB
dump 0.4b15 - Local Privilege Escalation2000-11-19
Exploit-DB
Nortel Networks Nautica Marlin - Denial of Service2000-02-25
CVE-2000-1009 — Redhat Linux vulnerability | cvebase