Vulnerability Description
Phusion Passenger before 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phusion | Passenger | <= 4.0.36 |
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.h
- http://openwall.com/lists/oss-security/2014/01/28/8
- http://openwall.com/lists/oss-security/2014/01/30/3
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958
- https://bugzilla.redhat.com/show_bug.cgi?id=1058992
- https://github.com/phusion/passenger/commit/34b1087870c2
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.h
- http://openwall.com/lists/oss-security/2014/01/28/8
- http://openwall.com/lists/oss-security/2014/01/30/3
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958
- https://bugzilla.redhat.com/show_bug.cgi?id=1058992
- https://github.com/phusion/passenger/commit/34b1087870c2
FAQ
What is CVE-2014-1831?
CVE-2014-1831 is a vulnerability with a CVSS score of 2.1 (LOW). Phusion Passenger before 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.
How severe is CVE-2014-1831?
CVE-2014-1831 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1831?
Check the references section above for vendor advisories and patch information. Affected products include: Phusion Passenger.