Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0270: The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which a

0
Low
VulnerabilityCVE-2000-0270cve-2000-0270
Published: Tue Apr 18 2000 (04/18/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: gnu
Product: emacs

Description

The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which allows attackers to conduct a symlink attack.

AI-Powered Analysis

AILast updated: 06/30/2025, 12:10:06 UTC

Technical Analysis

CVE-2000-0270 is a vulnerability found in GNU Emacs versions 20.0 through 20.6, specifically in the make-temp-name Lisp function. This function is responsible for creating temporary files during Emacs operations. The issue arises because the temporary files are created with predictable names, which can be anticipated by an attacker. This predictability enables a symlink attack, where an attacker creates a symbolic link with the expected temporary filename pointing to a sensitive file. When Emacs writes to the temporary file, it inadvertently overwrites or modifies the target file linked by the symlink. This can lead to unauthorized modification of files, potentially compromising data integrity and confidentiality. The vulnerability requires local access (AV:L) and no authentication (Au:N), with low attack complexity (AC:L). The CVSS score is 3.6, indicating a low severity level. There are no known exploits in the wild, and no patches are available for these older Emacs versions, which are now considered legacy software.

Potential Impact

For European organizations, the impact of this vulnerability is generally limited due to the requirement for local access and the absence of remote exploitation capabilities. However, in environments where Emacs 20.x is still in use—such as legacy systems, academic institutions, or specialized development environments—this vulnerability could allow an attacker with local access to manipulate or corrupt files by exploiting predictable temporary file names. This could lead to data integrity issues, unauthorized data modification, or potential privilege escalation if critical configuration or system files are targeted. While the confidentiality impact is partial, the integrity impact is more significant. The lack of availability impact reduces the overall risk. Given the age of the vulnerability and the software versions affected, the threat is mostly relevant in niche or legacy contexts rather than widespread modern enterprise environments.

Mitigation Recommendations

Since no official patches are available for Emacs 20.x, European organizations should consider the following specific mitigations: 1) Upgrade to a more recent and actively maintained version of Emacs where this vulnerability has been addressed. 2) If upgrading is not immediately possible, restrict local access to systems running vulnerable Emacs versions to trusted users only, minimizing the risk of local exploitation. 3) Implement file system monitoring to detect unexpected symbolic links or changes in directories where temporary files are created by Emacs. 4) Use operating system-level security features such as mandatory access controls (e.g., SELinux, AppArmor) to limit the ability of users to create symbolic links in sensitive directories. 5) Educate users and administrators about the risks of using outdated software and encourage migration to supported versions. 6) Consider running Emacs in a sandboxed environment or container to limit the scope of potential damage from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7df9e8

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/30/2025, 12:10:06 PM

Last updated: 2/3/2026, 11:41:10 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats