Skip to main content

CVE-2000-0269: Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, wh

Low
VulnerabilityCVE-2000-0269cve-2000-0269
Published: Tue Apr 18 2000 (04/18/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: gnu
Product: emacs

Description

Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, which allows local users to read or modify communications between Emacs and the subprocess.

AI-Powered Analysis

AILast updated: 06/30/2025, 12:10:52 UTC

Technical Analysis

CVE-2000-0269 is a vulnerability in GNU Emacs version 20 (including subversions 20.0 through 20.6) where the software does not correctly set permissions on the slave pseudo-terminal (PTY) device when launching a new subprocess. In Unix-like operating systems, PTYs are used to emulate terminal devices, allowing processes to communicate as if through a terminal. When Emacs starts a subprocess, it allocates a PTY pair: a master and a slave. The slave PTY is used by the subprocess as its controlling terminal. Proper permission settings on the slave PTY are critical to ensure that unauthorized local users cannot intercept or tamper with the data exchanged between Emacs and its subprocess. Due to improper permission handling, local users on the same system can potentially read from or write to the slave PTY device, thereby eavesdropping on or modifying the communication between Emacs and the subprocess. This could lead to leakage of sensitive information or manipulation of subprocess input/output streams. The vulnerability requires local access (i.e., the attacker must have an account on the affected system) and does not require authentication beyond that. Exploitation does not impact system availability or integrity of Emacs itself but compromises confidentiality of subprocess communications. No patches are available for this vulnerability, and there are no known exploits in the wild. The CVSS score is low (2.1), reflecting the limited scope and impact of the vulnerability.

Potential Impact

For European organizations, the impact of CVE-2000-0269 is generally limited due to the age of the affected software (Emacs 20 was released around 1997-1999) and the low severity of the vulnerability. However, organizations that maintain legacy Unix/Linux systems running these specific Emacs versions could face confidentiality risks if multiple users have local access to the same system. In multi-user environments such as shared servers, development machines, or academic institutions, an attacker with local access could intercept sensitive data exchanged between Emacs and subprocesses, potentially exposing credentials, scripts, or other confidential information. Since the vulnerability does not allow remote exploitation, the risk is confined to insider threats or compromised local accounts. The lack of patches means organizations must rely on compensating controls or upgrading to newer Emacs versions. Overall, the threat is low for most modern European enterprises but could be relevant in legacy or specialized environments.

Mitigation Recommendations

Given that no official patches are available for this vulnerability, European organizations should consider the following specific mitigation measures: 1) Upgrade Emacs to a more recent, supported version where this PTY permission issue is resolved. Versions after Emacs 20 have addressed many security and permission handling improvements. 2) Restrict local user access on systems running vulnerable Emacs versions by enforcing strict user account management, limiting shell access, and employing strong authentication mechanisms. 3) Use containerization or sandboxing to isolate Emacs subprocesses, reducing the risk of unauthorized local users accessing PTY devices. 4) Monitor and audit local user activities on critical systems to detect suspicious access patterns or attempts to exploit local vulnerabilities. 5) If upgrading is not feasible, consider replacing Emacs 20 with alternative editors or tools that do not exhibit this vulnerability. 6) Implement mandatory access control (MAC) frameworks such as SELinux or AppArmor to enforce fine-grained permissions on PTY devices and limit inter-user access. These steps go beyond generic advice by focusing on legacy system management, user access controls, and system hardening specific to the vulnerability context.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df9e6

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/30/2025, 12:10:52 PM

Last updated: 7/28/2025, 12:22:55 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats