4.4
CVSSv2

CVE-2014-0039

Published: 08/02/2014 Updated: 21/02/2014
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Untrusted search path vulnerability in fwsnort prior to 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory.

Vulnerable Product Search on Vulmon Subscribe to Product

cipherdyne fwsnort 1.6.1

cipherdyne fwsnort 1.6

cipherdyne fwsnort 1.5

cipherdyne fwsnort 1.0

cipherdyne fwsnort 0.9.0

cipherdyne fwsnort 0.6.3

cipherdyne fwsnort 0.6.2

cipherdyne fwsnort

cipherdyne fwsnort 1.0.4

cipherdyne fwsnort 1.0.3

cipherdyne fwsnort 0.8.0

cipherdyne fwsnort 0.7.0

cipherdyne fwsnort 0.5

cipherdyne fwsnort 1.0.6

cipherdyne fwsnort 1.0.5

cipherdyne fwsnort 0.8.2

cipherdyne fwsnort 0.8.1

cipherdyne fwsnort 0.6.1

cipherdyne fwsnort 0.6

cipherdyne fwsnort 1.6.3

cipherdyne fwsnort 1.6.2

cipherdyne fwsnort 1.0.2

cipherdyne fwsnort 1.0.1

cipherdyne fwsnort 0.6.5

cipherdyne fwsnort 0.6.4

Vendor Advisories

Debian Bug report logs - #737495 fwsnort: CVE-2014-0039: configuration file can be loaded from cwd when run as a non-root user Package: fwsnort; Maintainer for fwsnort is Debian QA Group <packages@qadebianorg>; Source for fwsnort is src:fwsnort (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@debianorg&g ...
Untrusted search path vulnerability in fwsnort before 164, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnortconf in the current working directory ...