First published: Thu Nov 10 2016(Updated: )
Teradata Virtual Machine Community Edition v15.10's perl script /opt/teradata/gsctools/bin/t2a.pl creates files in /tmp in an insecure manner, this may lead to elevated code execution.
Credit: larry0@me.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teradata Virtual Machine | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7489 is classified as a high severity vulnerability due to its potential to allow elevated code execution.
To fix CVE-2016-7489, ensure that the perl script /opt/teradata/gsctools/bin/t2a.pl properly restricts file creation in safe directories.
The risks associated with CVE-2016-7489 include unauthorized code execution and potential takeover of the system.
CVE-2016-7489 affects Teradata Virtual Machine Community Edition version 15.10.
As of the last update, there are no specific reports confirming active exploitation of CVE-2016-7489 in the wild.