Vulnerability Description
Untrusted search path vulnerability in Catfish through 0.4.0.3 allows local users to gain privileges via a Trojan horse catfish.py in the current working directory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Catfish Project | Catfish | 0.4.0 |
References
- http://openwall.com/lists/oss-security/2014/02/25/2
- http://openwall.com/lists/oss-security/2014/02/25/4
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739958
- https://bugzilla.redhat.com/show_bug.cgi?id=1069396
- http://openwall.com/lists/oss-security/2014/02/25/2
- http://openwall.com/lists/oss-security/2014/02/25/4
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739958
- https://bugzilla.redhat.com/show_bug.cgi?id=1069396
FAQ
What is CVE-2014-2093?
CVE-2014-2093 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Untrusted search path vulnerability in Catfish through 0.4.0.3 allows local users to gain privileges via a Trojan horse catfish.py in the current working directory.
How severe is CVE-2014-2093?
CVE-2014-2093 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-2093?
Check the references section above for vendor advisories and patch information. Affected products include: Catfish Project Catfish.