Skip to main content

CVE-2000-0365: Red Hat Linux 6.0 installs the /dev/pts file system with insecure modes, which allows local users to

Medium
VulnerabilityCVE-2000-0365cve-2000-0365
Published: Tue Jun 01 1999 (06/01/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: redhat
Product: linux

Description

Red Hat Linux 6.0 installs the /dev/pts file system with insecure modes, which allows local users to write to other tty devices.

AI-Powered Analysis

AILast updated: 07/01/2025, 17:24:55 UTC

Technical Analysis

CVE-2000-0365 is a vulnerability identified in Red Hat Linux version 6.0, where the /dev/pts filesystem is installed with insecure permissions. The /dev/pts filesystem is a pseudo-terminal device filesystem used to manage terminal sessions. In this specific case, the insecure modes allow local users to write to other users' tty devices. This means that any local user on the system could potentially interfere with or manipulate the terminal sessions of other users by writing data directly to their terminal devices. Such interference could include injecting commands, disrupting sessions, or capturing sensitive terminal output. The vulnerability is local in nature, requiring the attacker to have access to the system as a non-privileged user. The CVSS score of 4.6 (medium severity) reflects that while the vulnerability can impact confidentiality, integrity, and availability, it requires local access and low attack complexity. There is no authentication required beyond local user access, and no patch is available for this issue, as it dates back to 1999 and affects an outdated Linux distribution version. No known exploits in the wild have been reported. The vulnerability primarily affects the Red Hat Linux 6.0 distribution, which is now obsolete, but it highlights the importance of secure permissions on pseudo-terminal devices to prevent local privilege escalation or session hijacking.

Potential Impact

For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Red Hat Linux 6.0. However, if legacy systems running this version are still in use, the vulnerability could allow local attackers to interfere with terminal sessions of other users, potentially leading to unauthorized command injection, session disruption, or leakage of sensitive information displayed on terminals. This could compromise confidentiality and integrity of user sessions and disrupt availability of terminal access. In environments where multiple users share the same system, such as development or testing servers, this could lead to insider threats or accidental damage. The vulnerability does not allow remote exploitation, so the risk is limited to insiders or attackers who have already gained local access. European organizations with strict compliance requirements or handling sensitive data should be cautious about any legacy systems still in operation. Overall, the impact is limited but could be significant in specific legacy or multi-user scenarios.

Mitigation Recommendations

Given that no official patch is available for this vulnerability in Red Hat Linux 6.0, organizations should consider the following specific mitigation steps: 1) Upgrade or migrate all systems running Red Hat Linux 6.0 to a supported and updated Linux distribution version that has corrected the /dev/pts permissions issue. 2) If upgrading is not immediately possible, manually verify and correct the permissions of the /dev/pts filesystem to restrict write access only to authorized users. This can be done by remounting /dev/pts with appropriate mode options (e.g., mode=620) to prevent unauthorized writes. 3) Limit local user access to trusted personnel only and enforce strict user account management and monitoring to detect suspicious activities. 4) Use access control mechanisms such as SELinux or AppArmor to restrict interactions with terminal devices. 5) Regularly audit terminal device permissions and monitor system logs for unusual terminal activity. 6) Educate users about the risks of shared systems and encourage use of secure remote access methods that isolate user sessions. These targeted mitigations go beyond generic advice by focusing on legacy system management, manual permission adjustments, and local user access controls.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df057

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 5:24:55 PM

Last updated: 7/26/2025, 9:34:13 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats