First published: Thu Nov 21 2019(Updated: )
Slackware 13.1, 13.37, 14.0 and 14.1 contain world-writable permissions on the iodbctest and iodbctestw programs within the libiodbc package, which could allow local users to use RPATH information to execute arbitrary code with root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libiodbc2 | 3.52.9-2.1 3.52.9-3 3.52.9-4 | |
Slackware Slackware Linux | =13.1 | |
Slackware Slackware Linux | =13.37 | |
Slackware Slackware Linux | =14.0 | |
Slackware Slackware Linux | =14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-7172 is high with a severity value of 7.8.
CVE-2013-7172 is a vulnerability in Slackware Linux that allows local users to execute arbitrary code with root privileges by exploiting world-writable permissions on the iodbctest and iodbctestw programs within the libiodbc package.
Local users can exploit CVE-2013-7172 by using RPATH information to execute arbitrary code with root privileges.
Slackware Linux versions 13.1, 13.37, 14.0, and 14.1 are affected by CVE-2013-7172.
To fix CVE-2013-7172, users should update the libiodbc package to version 3.52.9-2.1, 3.52.9-3, or 3.52.9-4.