CVE-2014-3219
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
09/02/2018
Last modified:
24/09/2019
Description
fish before 2.1.1 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/fishd.log.%s, (2) /tmp/.pac-cache.$USER, (3) /tmp/.yum-cache.$USER, or (4) /tmp/.rpm-cache.$USER.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:fishshell:fish:*:*:*:*:*:*:*:* | 2.1.1 (excluding) | |
| cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132751.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html
- http://security.gentoo.org/glsa/glsa-201412-49.xml
- http://www.openwall.com/lists/oss-security/2014/05/06/3
- http://www.openwall.com/lists/oss-security/2014/09/28/8
- http://www.securityfocus.com/bid/67115
- https://bugzilla.redhat.com/show_bug.cgi?id=1092091
- https://github.com/fish-shell/fish-shell/commit/3225d7e169a9edb2f470c26989e7bc8e0d0355ce
- https://github.com/fish-shell/fish-shell/issues/1440



