Configuration Affecting slim package, versions <1.3.1-7


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-SLIM-1559901
  • published30 Aug 2010
  • disclosed30 Aug 2010

Introduced: 30 Aug 2010

CVE-2010-2945  (opens in a new tab)
CWE-16  (opens in a new tab)

How to fix?

Upgrade Debian:12 slim to version 1.3.1-7 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream slim package and not the slim package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp.

CVSS Scores

version 3.1