Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0269: Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, wh

0
Low
VulnerabilityCVE-2000-0269cve-2000-0269
Published: Tue Apr 18 2000 (04/18/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: gnu
Product: emacs

Description

Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, which allows local users to read or modify communications between Emacs and the subprocess.

AI-Powered Analysis

AILast updated: 06/30/2025, 12:10:52 UTC

Technical Analysis

CVE-2000-0269 is a vulnerability in GNU Emacs version 20 (including subversions 20.0 through 20.6) where the software does not correctly set permissions on the slave pseudo-terminal (PTY) device when launching a new subprocess. In Unix-like operating systems, PTYs are used to emulate terminal devices, allowing processes to communicate as if through a terminal. When Emacs starts a subprocess, it allocates a PTY pair: a master and a slave. The slave PTY is used by the subprocess as its controlling terminal. Proper permission settings on the slave PTY are critical to ensure that unauthorized local users cannot intercept or tamper with the data exchanged between Emacs and its subprocess. Due to improper permission handling, local users on the same system can potentially read from or write to the slave PTY device, thereby eavesdropping on or modifying the communication between Emacs and the subprocess. This could lead to leakage of sensitive information or manipulation of subprocess input/output streams. The vulnerability requires local access (i.e., the attacker must have an account on the affected system) and does not require authentication beyond that. Exploitation does not impact system availability or integrity of Emacs itself but compromises confidentiality of subprocess communications. No patches are available for this vulnerability, and there are no known exploits in the wild. The CVSS score is low (2.1), reflecting the limited scope and impact of the vulnerability.

Potential Impact

For European organizations, the impact of CVE-2000-0269 is generally limited due to the age of the affected software (Emacs 20 was released around 1997-1999) and the low severity of the vulnerability. However, organizations that maintain legacy Unix/Linux systems running these specific Emacs versions could face confidentiality risks if multiple users have local access to the same system. In multi-user environments such as shared servers, development machines, or academic institutions, an attacker with local access could intercept sensitive data exchanged between Emacs and subprocesses, potentially exposing credentials, scripts, or other confidential information. Since the vulnerability does not allow remote exploitation, the risk is confined to insider threats or compromised local accounts. The lack of patches means organizations must rely on compensating controls or upgrading to newer Emacs versions. Overall, the threat is low for most modern European enterprises but could be relevant in legacy or specialized environments.

Mitigation Recommendations

Given that no official patches are available for this vulnerability, European organizations should consider the following specific mitigation measures: 1) Upgrade Emacs to a more recent, supported version where this PTY permission issue is resolved. Versions after Emacs 20 have addressed many security and permission handling improvements. 2) Restrict local user access on systems running vulnerable Emacs versions by enforcing strict user account management, limiting shell access, and employing strong authentication mechanisms. 3) Use containerization or sandboxing to isolate Emacs subprocesses, reducing the risk of unauthorized local users accessing PTY devices. 4) Monitor and audit local user activities on critical systems to detect suspicious access patterns or attempts to exploit local vulnerabilities. 5) If upgrading is not feasible, consider replacing Emacs 20 with alternative editors or tools that do not exhibit this vulnerability. 6) Implement mandatory access control (MAC) frameworks such as SELinux or AppArmor to enforce fine-grained permissions on PTY devices and limit inter-user access. These steps go beyond generic advice by focusing on legacy system management, user access controls, and system hardening specific to the vulnerability context.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7df9e6

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/30/2025, 12:10:52 PM

Last updated: 2/7/2026, 5:16:20 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats