First published: Thu Nov 29 2007(Updated: )
Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6167 is considered a medium severity vulnerability due to its potential for local users to execute arbitrary code.
CVE-2007-6167 allows local users to exploit an untrusted search path in yast2-core to run malicious yast2 modules.
Local users of SUSE Linux are primarily affected by CVE-2007-6167.
To fix CVE-2007-6167, it is recommended to update to the latest version of SUSE Linux that addresses this vulnerability.
A possible workaround for CVE-2007-6167 is to restrict access to the yast2 module directories for untrusted users.