header-logo
Suggest Exploit
vendor:
Linux
by:
SecurityFocus
7.2
CVSS
HIGH
Boot Single User Mode
N/A
CWE
Product Name: Linux
Affected Version From: RedHat Linux 6.0
Affected Version To: RedHat Linux 6.0
Patch Exists: No
Related CWE: N/A
CPE: o:redhat:linux:6.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2000

Boot Single User Mode

RedHat Linux 6.0 does not properly protect the obtaining of a shell by booting single user mode. When booting single user mode, RedHat will prompt for the root password. However, pressing ^C (causing a SIGINT to be sent) immediately results in a root shell being made available.

Mitigation:

To mitigate this vulnerability, users should ensure that the root password is secure and not easily guessed.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1005/info

A vulnerability exists in the manner in which RedHat Linux 6.0 protects the obtaining of a shell by booting single user mode. RedHat will prompt for the root password upon entering single user mode. Pressing ^C (causing a SIGINT to be sent) immediately results in a root shell being made available.

boot single user from lilo, and press ^C (control-C)