Skip to main content

CVE-2000-0373: Vulnerabilities in the KDE kvt terminal program allow local users to gain root privileges.

High
VulnerabilityCVE-2000-0373cve-2000-0373
Published: Tue Jun 01 1999 (06/01/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: kde
Product: kvt

Description

Vulnerabilities in the KDE kvt terminal program allow local users to gain root privileges.

AI-Powered Analysis

AILast updated: 06/27/2025, 22:12:41 UTC

Technical Analysis

CVE-2000-0373 is a high-severity local privilege escalation vulnerability found in the KDE kvt terminal program. The vulnerability allows local users to gain root privileges on affected systems. The KDE kvt terminal is a terminal emulator component of the KDE desktop environment, which was widely used in Unix-like operating systems around the time of the vulnerability's publication in 1999. The CVSS v2 score of 7.2 indicates a high impact vulnerability with local attack vector (AV:L), low attack complexity (AC:L), no authentication required (Au:N), and complete confidentiality, integrity, and availability impact (C:C/I:C/A:C). This means that any local user on the system could exploit the vulnerability without needing to authenticate or perform complex steps, resulting in full system compromise. Although no specific affected versions are listed and no patch is available, the vulnerability is significant because it allows privilege escalation from a non-privileged user to root, which can lead to full control over the affected system. There are no known exploits in the wild reported, but the nature of the vulnerability makes it a critical risk if an attacker gains local access. The lack of a patch suggests that either the product is obsolete or the vulnerability was never fixed, which is common for legacy software from that era.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether legacy systems running KDE kvt are still in use. In environments where outdated Unix-like systems with KDE kvt are present, this vulnerability could allow any local user, including malicious insiders or attackers who have gained limited access, to escalate privileges to root. This would compromise the confidentiality, integrity, and availability of the entire system, potentially leading to data breaches, system manipulation, or service disruption. Given the age of the vulnerability, modern systems are unlikely to be affected, but legacy industrial control systems, research environments, or specialized servers might still run vulnerable versions. The risk is particularly relevant for organizations with lax patch management or those operating legacy infrastructure. Exploitation could facilitate lateral movement within networks and full system takeover, severely impacting business operations and data security.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should consider the following specific mitigation strategies: 1) Identify and inventory all systems running KDE kvt or legacy KDE desktop environments to assess exposure. 2) Where possible, upgrade or migrate to modern, supported terminal emulators and desktop environments that have active security maintenance. 3) Restrict local user access to systems running vulnerable software by enforcing strict access controls and user permissions, minimizing the number of users with shell access. 4) Employ application whitelisting and monitoring to detect and prevent unauthorized execution of vulnerable terminal programs. 5) Use mandatory access control systems (e.g., SELinux, AppArmor) to limit the ability of processes to escalate privileges even if exploited. 6) Monitor system logs for suspicious local activity indicative of privilege escalation attempts. 7) If legacy systems cannot be upgraded, consider isolating them from critical networks to reduce the impact of potential compromise. These targeted mitigations go beyond generic advice by focusing on legacy system identification, access restriction, and containment.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df059

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 10:12:41 PM

Last updated: 8/11/2025, 5:20:01 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats