ID CVE-2014-0039
Summary Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory. Per: http://cwe.mitre.org/data/definitions/426.html "CWE-426: Untrusted Search Path"
References
Vulnerable Configurations
  • cpe:2.3:a:cipherdyne:fwsnort:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:0.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:0.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.5:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.6:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cipherdyne:fwsnort:1.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:cipherdyne:fwsnort:1.6.4:*:*:*:*:*:*:*
CVSS
Base: 4.4 (as of 21-02-2014 - 05:06)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 65341
confirm
fedora
  • FEDORA-2014-1972
  • FEDORA-2014-1975
mlist [oss-security] 20140203 CVE-2014-0039: fwsnort loaded configuration file from cwd when run as a non-root user
osvdb 102822
Last major update 21-02-2014 - 05:06
Published 08-02-2014 - 00:55
Last modified 21-02-2014 - 05:06
Back to Top