ID |
CVE-2014-2095
|
Summary |
Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, when a Fedora package such as 0.8.2-1 is not used, allows local users to gain privileges via a Trojan horse bin/catfish.pyc under the current working directory. Per: http://cwe.mitre.org/data/definitions/426.html
"CWE-426: Untrusted Search Path" |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:catfish_project:catfish:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:catfish_project:catfish:0.6.0:*:*:*:*:*:*:*
-
cpe:2.3:a:catfish_project:catfish:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:catfish_project:catfish:0.6.1:*:*:*:*:*:*:*
-
cpe:2.3:a:catfish_project:catfish:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:catfish_project:catfish:0.6.2:*:*:*:*:*:*:*
-
cpe:2.3:a:catfish_project:catfish:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:catfish_project:catfish:0.6.3:*:*:*:*:*:*:*
-
cpe:2.3:a:catfish_project:catfish:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:catfish_project:catfish:0.6.4:*:*:*:*:*:*:*
-
cpe:2.3:a:catfish_project:catfish:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:catfish_project:catfish:0.8.0:*:*:*:*:*:*:*
-
cpe:2.3:a:catfish_project:catfish:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:catfish_project:catfish:0.8.1:*:*:*:*:*:*:*
-
cpe:2.3:a:catfish_project:catfish:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:catfish_project:catfish:0.8.2:*:*:*:*:*:*:*
-
cpe:2.3:a:catfish_project:catfish:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:catfish_project:catfish:1.0.0:*:*:*:*:*:*:*
|
CVSS |
Base: | 4.6 (as of 11-03-2014 - 16:56) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
refmap
via4
|
confirm | | mlist | [oss-security] 20140225 Re: CVE request for catfish program |
|
Last major update |
11-03-2014 - 16:56 |
Published |
26-02-2014 - 14:55 |
Last modified |
11-03-2014 - 16:56 |