Vulnerability Note VU#960877
Red Hat linux restore uses insecure environment variables allowing root compromise
Some implementations of the Linux restoration utility, restore, call external programs on remote machines via the RSH environment variable. This may permit an attacker to compromise root if restore is setuid root.
Some implementations of the Linux restoration utility, restore, permit use of storage devices on remote machines via an access program on the local machine. This access program is identified in the RSH environment variable. The value in the environment variable is not validated for security prior to its use in calling a program. In some implementations, restore is protected setuid root.
By specifying a shell script of their own devising, malicious local users can exploit the setuid protection on restore to secure root access for themselves to execute arbitrary commands.
Apply vendor patches; see the Systems Affected section below.
Remove the setuid protection from restore.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|RedHat||Affected||31 Oct 2000||23 Jul 2001|
|Debian||Not Affected||16 Jul 2001||23 Jul 2001|
|Engarde||Not Affected||16 Jul 2001||23 Jul 2001|
|OpenBSD||Not Affected||16 Jul 2001||23 Jul 2001|
|SGI||Not Affected||16 Jul 2001||16 Jul 2001|
|Hewlett Packard||Unknown||16 Jul 2001||07 Aug 2001|
CVSS Metrics (Learn More)
This vulnerability was first reported through discussion on Bugtraq .
This document was last modified by Tim Shimeall.
- CVE IDs: CAN-2000-1125
- Date Public: 04 Nov 2000
- Date First Published: 21 Aug 2001
- Date Last Updated: 21 Aug 2001
- Severity Metric: 20.06
- Document Revision: 10
If you have feedback, comments, or additional information about this vulnerability, please send us email.