First published: Thu Nov 21 2019(Updated: )
Slackware 14.0 and 14.1, and Slackware LLVM 3.0-i486-2 and 3.3-i486-2, contain world-writable permissions on the /tmp directory which could allow remote attackers to execute arbitrary code with root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/llvm-2.9 | ||
debian/llvm-3.0 | ||
debian/llvm-toolchain-3.2 | ||
Slackware Linux | =14.0 | |
Slackware Linux | =14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-7171 is critical with a severity value of 9.8.
CVE-2013-7171 allows remote attackers to execute arbitrary code with root privileges on Slackware 14.0 and 14.1, and Slackware LLVM 3.0-i486-2 and 3.3-i486-2.
To fix CVE-2013-7171, ensure that the /tmp directory on Slackware 14.0 and 14.1, and Slackware LLVM 3.0-i486-2 and 3.3-i486-2 has proper permissions and is not world-writable.
More informatioon about CVE-2013-7171 can be found at the following references: [1] https://security-tracker.debian.org/tracker/CVE-2013-7171, [2] http://www.openwall.com/lists/oss-security/2013/12/20/1, [3] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-7171
The CWE of CVE-2013-7171 is CWE-20.