Vulnerabilites related to gnu - readline
Vulnerability from fkie_nvd
Published
2014-08-20 14:55
Modified
2024-11-21 02:06
Severity ?
Summary
The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mageia | mageia | 3.0 | |
mageia | mageia | 4.0 | |
gnu | readline | * | |
gnu | readline | 2.1 | |
gnu | readline | 2.2 | |
gnu | readline | 4.0 | |
gnu | readline | 4.1 | |
gnu | readline | 4.2 | |
gnu | readline | 4.2 | |
gnu | readline | 4.3 | |
gnu | readline | 5.0 | |
gnu | readline | 5.1 | |
gnu | readline | 5.2 | |
gnu | readline | 6.0 | |
gnu | readline | 6.1 | |
gnu | readline | 6.2 | |
opensuse | opensuse | 12.3 | |
opensuse | opensuse | 13.1 | |
fedoraproject | fedora | 20 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*", matchCriteriaId: "76F1E356-E019-47E8-AA5F-702DA93CF74E", vulnerable: true, }, { criteria: "cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*", matchCriteriaId: "F805A106-9A6F-48E7-8582-D3C5A26DFC11", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:readline:*:*:*:*:*:*:*:*", matchCriteriaId: "7BCAD25A-3DBB-43F3-B5B7-5DF6742095D5", versionEndIncluding: "6.3", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:2.1:*:*:*:*:*:*:*", matchCriteriaId: "296B4AF4-38DF-45F4-BE15-8735F9E31D3E", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:2.2:*:*:*:*:*:*:*", matchCriteriaId: "21398E40-282A-48FC-8576-A6E8665E46E6", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:4.0:*:*:*:*:*:*:*", matchCriteriaId: "B9C14829-D4DE-4D8E-B7F9-E45C3E32A32D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:4.1:*:*:*:*:*:*:*", matchCriteriaId: "278DFB21-7C51-415F-B298-03A2778D6CE6", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:4.2:*:*:*:*:*:*:*", matchCriteriaId: "78C36069-3C51-48A6-A628-304962F4B8D2", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:4.2:a:*:*:*:*:*:*", matchCriteriaId: "089403A9-D5AF-4313-981F-5541FE42D40D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:4.3:*:*:*:*:*:*:*", matchCriteriaId: "8253B587-80FB-475A-B089-8E7C03E69780", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:5.0:*:*:*:*:*:*:*", matchCriteriaId: "828A8311-0925-4400-B883-777A1F83DB10", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:5.1:*:*:*:*:*:*:*", matchCriteriaId: "64BA0EFC-3660-453B-96C4-CC5A8E98DC87", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:5.2:*:*:*:*:*:*:*", matchCriteriaId: "4D2F4ACC-1C60-40E0-B783-006A5D617336", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:6.0:*:*:*:*:*:*:*", matchCriteriaId: "AD372FD8-2FE3-434A-9EEF-E6E2CB940FC0", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:6.1:*:*:*:*:*:*:*", matchCriteriaId: "2434545A-2C38-48EE-9190-733FDB31FCB9", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:readline:6.2:*:*:*:*:*:*:*", matchCriteriaId: "F0456034-7EB9-4AC9-907D-80F38C7B1D36", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", matchCriteriaId: "DFBF430B-0832-44B0-AA0E-BA9E467F7668", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", matchCriteriaId: "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.", }, { lang: "es", value: "La función _rl_tropen en util.c en GNU readline anterior a 6.3 patch 3 permite a usuarios locales crear o sobrescribir ficheros arbitrarios a través de un ataque de enlace simbólico sobre un fichero /var/tmp/rltrace.[PID].", }, ], id: "CVE-2014-2524", lastModified: "2024-11-21T02:06:28.290", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:M/Au:N/C:N/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-08-20T14:55:05.860", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://advisories.mageia.org/MGASA-2014-0319.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q1/579", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q1/587", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:154", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:132", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1077023", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135686.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://advisories.mageia.org/MGASA-2014-0319.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q1/579", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q1/587", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:154", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:132", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1077023", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135686.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-59", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2014-2524
Vulnerability from cvelistv5
Published
2014-08-20 14:00
Modified
2024-08-06 10:14
Severity ?
EPSS score ?
Summary
The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
References
▼ | URL | Tags |
---|---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2014:154 | vendor-advisory, x_refsource_MANDRIVA | |
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html | vendor-advisory, x_refsource_SUSE | |
https://bugzilla.redhat.com/show_bug.cgi?id=1077023 | x_refsource_MISC | |
https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135686.html | vendor-advisory, x_refsource_FEDORA | |
http://seclists.org/oss-sec/2014/q1/587 | mailing-list, x_refsource_MLIST | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:132 | vendor-advisory, x_refsource_MANDRIVA | |
http://advisories.mageia.org/MGASA-2014-0319.html | x_refsource_CONFIRM | |
http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html | mailing-list, x_refsource_MLIST | |
http://seclists.org/oss-sec/2014/q1/579 | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:14:26.704Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "MDVSA-2014:154", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:154", }, { name: "openSUSE-SU-2014:1226", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1077023", }, { name: "FEDORA-2014-7523", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135686.html", }, { name: "[oss-security] 20140317 Re: Insecure usage of temporary files in GNU Readline", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2014/q1/587", }, { name: "MDVSA-2015:132", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:132", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0319.html", }, { name: "[Bug-readline] 20140331 Readline-6.3 Official Patch 3", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html", }, { name: "[oss-security] 20140314 Insecure usage of temporary files in GNU Readline", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2014/q1/579", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-14T00:00:00", descriptions: [ { lang: "en", value: "The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2015-04-13T14:57:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "MDVSA-2014:154", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:154", }, { name: "openSUSE-SU-2014:1226", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1077023", }, { name: "FEDORA-2014-7523", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135686.html", }, { name: "[oss-security] 20140317 Re: Insecure usage of temporary files in GNU Readline", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2014/q1/587", }, { name: "MDVSA-2015:132", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:132", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2014-0319.html", }, { name: "[Bug-readline] 20140331 Readline-6.3 Official Patch 3", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html", }, { name: "[oss-security] 20140314 Insecure usage of temporary files in GNU Readline", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2014/q1/579", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-2524", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "MDVSA-2014:154", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:154", }, { name: "openSUSE-SU-2014:1226", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1077023", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1077023", }, { name: "FEDORA-2014-7523", refsource: "FEDORA", url: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135686.html", }, { name: "[oss-security] 20140317 Re: Insecure usage of temporary files in GNU Readline", refsource: "MLIST", url: "http://seclists.org/oss-sec/2014/q1/587", }, { name: "MDVSA-2015:132", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:132", }, { name: "http://advisories.mageia.org/MGASA-2014-0319.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2014-0319.html", }, { name: "[Bug-readline] 20140331 Readline-6.3 Official Patch 3", refsource: "MLIST", url: "http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html", }, { name: "[oss-security] 20140314 Insecure usage of temporary files in GNU Readline", refsource: "MLIST", url: "http://seclists.org/oss-sec/2014/q1/579", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-2524", datePublished: "2014-08-20T14:00:00", dateReserved: "2014-03-17T00:00:00", dateUpdated: "2024-08-06T10:14:26.704Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }