Bug 1044846 (CVE-2013-7172) - CVE-2013-7172 libiodbc: insecure RPATH in certain binaries
Summary: CVE-2013-7172 libiodbc: insecure RPATH in certain binaries
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2013-7172
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-12-19 05:41 UTC by Murray McAllister
Modified: 2019-09-29 13:11 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-12-19 05:42:56 UTC


Attachments (Terms of Use)

Description Murray McAllister 2013-12-19 05:41:58 UTC
It was reported that the iodbctest and iodbctestw tools provided by the libiodbc package had an insecure RPATH (/tmp/) entry:

http://seclists.org/bugtraq/2013/Dec/93

This could lead to arbitrary code execution with the privileges of the user running the affected tools.

This issue did not affect the libiodbc packages in Fedora or EPEL, as the packages are built in /buildir/ and not /tmp/.

CVE request: http://seclists.org/oss-sec/2013/q4/525

Comment 1 Murray McAllister 2013-12-20 03:45:15 UTC
CVE-2013-7172 was assigned to this issue: http://seclists.org/oss-sec/2013/q4/527

Comment 2 Rex Dieter 2013-12-20 19:09:22 UTC
As an addendum to comment #1 about fedora/epel packages not being vulnerable, we explicitly delete the rpaths from the binaries in question as part of the build process (using chrpath --delete)


Note You need to log in before you can comment on or make changes to this bug.