Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2000-1134

8 documents7 sources
Severity
7.2HIGH
EPSS
0.2%
top 60.73%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 9
Latest updateMay 3

Description

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages8 packages

NVDhp/hp-ux11.11
NVDredhat/linux5 versions+4
NVDconectiva/linux6 versions+5

Patches

🔴Vulnerability Details

3
GHSA
GHSA-j272-pr5g-4cv9: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka2022-05-03
Kernel
namei: allow restricted O_CREAT of FIFOs and regular files2018-08-23
CVEList
CVE-2000-1134: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka2000-12-19

💥Exploits & PoCs

2
Exploit-DB
UUCP - File Creation/Overwriting Symlinks2000-12-04
Exploit-DB
Apple Mac OSX 10 / HP-UX 9/10/11 / Mandriva 6/7 / RedHat 5/6 / SCO 5 / IRIX 6 - Shell Redirection Race Condition2000-01-02

📋Vendor Advisories

1
Red Hat
security flaw2000-10-28

💬Community

1
Bugzilla
CVE-2000-1134 security flaw2018-08-16