Vulnerability Description
Untrusted search path vulnerability in Catfish through 0.4.0.3, when a Fedora package such as 0.4.0.2-2 is not used, allows local users to gain privileges via a Trojan horse catfish.pyc in the current working directory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Catfish Project | Catfish | 0.4.0 |
References
- http://openwall.com/lists/oss-security/2014/02/25/2
- http://openwall.com/lists/oss-security/2014/02/25/4
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739958
- https://bugzilla.redhat.com/show_bug.cgi?id=1069396
- http://openwall.com/lists/oss-security/2014/02/25/2
- http://openwall.com/lists/oss-security/2014/02/25/4
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739958
- https://bugzilla.redhat.com/show_bug.cgi?id=1069396
FAQ
What is CVE-2014-2094?
CVE-2014-2094 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Untrusted search path vulnerability in Catfish through 0.4.0.3, when a Fedora package such as 0.4.0.2-2 is not used, allows local users to gain privileges via a Trojan horse catfish.pyc in the current...
How severe is CVE-2014-2094?
CVE-2014-2094 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-2094?
Check the references section above for vendor advisories and patch information. Affected products include: Catfish Project Catfish.