Vulnerability Description
Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0 allows local users to gain privileges via a Trojan horse bin/catfish.py under the current working directory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Catfish Project | Catfish | 0.6.0 |
References
- http://openwall.com/lists/oss-security/2014/02/25/2
- http://openwall.com/lists/oss-security/2014/02/25/4
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739958
- https://bugzilla.redhat.com/show_bug.cgi?id=1069396
- http://openwall.com/lists/oss-security/2014/02/25/2
- http://openwall.com/lists/oss-security/2014/02/25/4
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739958
- https://bugzilla.redhat.com/show_bug.cgi?id=1069396
FAQ
What is CVE-2014-2096?
CVE-2014-2096 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0 allows local users to gain privileges via a Trojan horse bin/catfish.py under the current working directory.
How severe is CVE-2014-2096?
CVE-2014-2096 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-2096?
Check the references section above for vendor advisories and patch information. Affected products include: Catfish Project Catfish.