ID CVE-2014-2094
Summary Untrusted search path vulnerability in Catfish through 0.4.0.3, when a Fedora package such as 0.4.0.2-2 is not used, allows local users to gain privileges via a Trojan horse catfish.pyc in the current working directory.
References
Vulnerable Configurations
  • cpe:2.3:a:catfish_project:catfish:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.4.0.3:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 11-03-2014 - 16:55)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm
mlist [oss-security] 20140225 Re: CVE request for catfish program
Last major update 11-03-2014 - 16:55
Published 26-02-2014 - 14:55
Last modified 11-03-2014 - 16:55
Back to Top