Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0433: The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which all

0
Medium
VulnerabilityCVE-2000-0433cve-2000-0433
Published: Tue May 02 2000 (05/02/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: suse
Product: suse_linux

Description

The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles.

AI-Powered Analysis

AILast updated: 06/19/2025, 19:49:32 UTC

Technical Analysis

CVE-2000-0433 is a vulnerability found in the SuSE Linux distribution versions 6.1 through 6.4, specifically related to the aaa_base package. This package installs certain system accounts with their home directories incorrectly set to /tmp, a world-writable temporary directory. Because /tmp is accessible by all local users, this misconfiguration allows local attackers to create or manipulate standard user startup scripts (such as .profile or similar shell initialization files) within /tmp. When the system account logs in or executes processes that source these startup scripts, the attacker-controlled scripts can be executed with the privileges of those system accounts. This effectively enables privilege escalation from a local user to these system accounts, potentially allowing unauthorized access to sensitive system functions or data. The vulnerability does not require authentication but does require local access to the system. The CVSS v2 score is 4.6 (medium severity), reflecting that the attack vector is local, with low attack complexity, no authentication required, and partial impact on confidentiality, integrity, and availability. No patches or fixes were available at the time of publication, and no known exploits in the wild have been reported. The vulnerability arises from a configuration error rather than a software bug, making it a systemic risk in affected SuSE Linux installations of that era.

Potential Impact

For European organizations running legacy SuSE Linux versions 6.1 to 6.4, this vulnerability poses a significant risk of local privilege escalation. Although these versions are very old and unlikely to be in active production, any legacy systems still in use could be compromised by local attackers or insiders. The impact includes unauthorized access to system accounts, which could lead to further system compromise, data breaches, or disruption of services. Confidentiality is at risk because attackers can gain access to accounts that may have access to sensitive information. Integrity is compromised as attackers can execute arbitrary commands with elevated privileges. Availability could also be affected if attackers disrupt system processes or services. Given the local access requirement, the threat is mainly from insiders or attackers who have already gained some foothold on the system. The lack of patches means organizations must rely on configuration changes or system upgrades to mitigate the risk. In a European context, organizations with legacy infrastructure in sectors such as government, manufacturing, or research that historically used SuSE Linux might be vulnerable if these systems remain unpatched or un-upgraded.

Mitigation Recommendations

Since no official patch is available, organizations should take the following specific steps: 1) Immediately audit all SuSE Linux systems, especially versions 6.1 to 6.4, to identify any system accounts with home directories set to /tmp. 2) Reconfigure the home directories of these system accounts to a secure, non-world-writable location, such as /var/lib or /home with appropriate permissions. 3) Remove or restrict write permissions to /tmp for these accounts or implement stricter access controls on /tmp using mount options like 'noexec' and 'nosuid' to limit script execution. 4) Monitor and audit /tmp for unauthorized or suspicious files, particularly startup scripts that could be exploited. 5) Where possible, upgrade legacy SuSE Linux systems to supported versions that do not have this vulnerability. 6) Implement strict local user access controls and monitoring to detect and prevent unauthorized local access. 7) Employ intrusion detection systems (IDS) that can alert on unusual privilege escalation attempts or modifications to startup scripts in /tmp. These targeted measures go beyond generic advice by focusing on correcting the specific misconfiguration and monitoring the vulnerable attack vector.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7dfa81

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/19/2025, 7:49:32 PM

Last updated: 2/7/2026, 9:42:01 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats