ID CVE-2014-2095
Summary Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, when a Fedora package such as 0.8.2-1 is not used, allows local users to gain privileges via a Trojan horse bin/catfish.pyc under the current working directory. Per: http://cwe.mitre.org/data/definitions/426.html "CWE-426: Untrusted Search Path"
References
Vulnerable Configurations
  • cpe:2.3:a:catfish_project:catfish:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:1.0.0:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 11-03-2014 - 16:56)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm
mlist [oss-security] 20140225 Re: CVE request for catfish program
Last major update 11-03-2014 - 16:56
Published 26-02-2014 - 14:55
Last modified 11-03-2014 - 16:56
Back to Top