First published: Fri May 17 2013(Updated: )
Red Hat livecd-tools before 13.4.4, 17.x before 17.17, 18.x before 18.16, and 19.x before 19.3, when a rootpw directive is not set in a Kickstart file, sets the root user password to empty, which allows local users to gain privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/livecd-tools | <19.3 | 19.3 |
redhat/livecd-tools | <18.16 | 18.16 |
redhat/livecd-tools | <17.17 | 17.17 |
redhat/livecd-tools | <13.4.4 | 13.4.4 |
Redhat Livecd-tools | <13.4.4 | |
Redhat Livecd-tools | >=17.0<17.17 | |
Redhat Livecd-tools | >=18.0<18.16 | |
Redhat Livecd-tools | >=19.0<19.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2069 is classified as a high severity vulnerability due to the potential for local users to gain unauthorized privileges.
To fix CVE-2013-2069, upgrade the livecd-tools package to version 13.4.4, 17.17, 18.16, or 19.3 or later.
CVE-2013-2069 affects livecd-tools versions before 13.4.4, 17.x before 17.17, 18.x before 18.16, and 19.x before 19.3.
The vulnerability occurs because the root user password is set to empty when the rootpw directive is not set in a Kickstart file.
Anyone using affected versions of the livecd-tools package on Red Hat systems is impacted by CVE-2013-2069.