CVE-2014-2094
Published Feb 26, 2014
Last updated 11 years ago
Overview
- Description
- Untrusted search path vulnerability in Catfish through 0.4.0.3, when a Fedora package such as 0.4.0.2-2 is not used, allows local users to gain privileges via a Trojan horse catfish.pyc in the current working directory.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:catfish_project:catfish:0.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8241BFA6-82AC-45D5-B605-DAE0DAEC2597" }, { "criteria": "cpe:2.3:a:catfish_project:catfish:0.4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "006FCC24-1342-42F4-ABA2-B712C093EC81" }, { "criteria": "cpe:2.3:a:catfish_project:catfish:0.4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54408F0C-BCDB-40D6-B3DA-C05C3A88F4B4" }, { "criteria": "cpe:2.3:a:catfish_project:catfish:0.4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D944F307-7105-42C4-94A7-741F1F3D0729" } ], "operator": "OR" } ] } ]