First published: Tue Jun 08 2004(Updated: )
The PHP package in Slackware 8.1, 9.0, and 9.1, when linked against a static library, includes /tmp in the search path, which allows local users to execute arbitrary code as the PHP user by inserting shared libraries into the appropriate path.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Slackware Slackware Linux | =9.0 | |
Slackware Slackware Linux | =8.1 | |
Slackware Slackware Linux | =9.1 | |
Slackware Linux | =8.1 | |
Slackware Linux | =9.0 | |
Slackware Linux | =9.1 |
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.419765
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0530 is considered a high severity vulnerability due to the potential for local users to execute arbitrary code.
To fix CVE-2004-0530, upgrade the PHP package to a version not affected by this vulnerability on Slackware.
CVE-2004-0530 affects users of Slackware Linux versions 8.1, 9.0, and 9.1 when linked against a static library.
An attacker could exploit CVE-2004-0530 to execute arbitrary code as the PHP user, compromising the system.
A possible workaround for CVE-2004-0530 is to remove /tmp from the library search path, but this is not a complete fix.