First published: Mon Mar 25 2013(Updated: )
It was reported [1] that ibutils 1.5.7 suffered from a flaw due to improper handling of files in the /tmp directory. This makes ibutils vulnerable to symlink attacks, which could be used to overwrite arbitrary files on the system. [1] <a href="http://seclists.org/fulldisclosure/2013/Mar/87">http://seclists.org/fulldisclosure/2013/Mar/87</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =6.0 | |
OpenFabrics ibutils | =1.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2561 is rated as a medium severity vulnerability due to its potential for file overwriting through symlink attacks.
To fix CVE-2013-2561, you should upgrade ibutils to version 1.5.8 or later and ensure proper file handling in the /tmp directory.
The impact of CVE-2013-2561 includes the potential overwriting of arbitrary files, which can lead to system compromise.
CVE-2013-2561 affects ibutils version 1.5.7 and Red Hat Enterprise Linux 6.0.
CVE-2013-2561 is a local vulnerability that requires access to the filesystem to exploit.