Privilege Escalation via RSH Environmental Variable in Red Hat Linux 6.2

Privilege Escalation via RSH Environmental Variable in Red Hat Linux 6.2

CVE-2000-1125 · HIGH Severity

AV:L/AC:L/AU:N/C:C/I:C/A:C

restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.

Learn more about our Cis Benchmark Audit For Distribution Independent Linux.