6.8
CVSSv2

CVE-2014-3391

Published: 10/10/2014 Updated: 15/08/2023
CVSS v2 Base Score: 6.8 | Impact Score: 10 | Exploitability Score: 3.1
VMScore: 605
Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Untrusted search path vulnerability in Cisco ASA Software 8.x prior to 8.4(3), 8.5, and 8.7 prior to 8.7(1.13) allows local users to gain privileges by placing a Trojan horse library file in external memory, leading to library use after device reload because of an incorrect LD_LIBRARY_PATH value, aka Bug ID CSCtq52661.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco adaptive security appliance software 8.7.8

cisco adaptive security appliance software 8.3.2.40

cisco adaptive security appliance software 8.3.1

cisco adaptive security appliance software 8.2.2

cisco adaptive security appliance software 8.3.1.1

cisco adaptive security appliance software 8.3.1.6

cisco adaptive security appliance software 8.2.5.40

cisco adaptive security appliance software 8.2.1

cisco adaptive security appliance software 8.2.2.12

cisco adaptive security appliance software 8.2.5.22

cisco adaptive security appliance software 8.2.5.33

cisco adaptive security appliance software 8.2.5.41

cisco adaptive security appliance software 8.2.4.4

cisco adaptive security appliance software 8.2.2.10

cisco adaptive security appliance software 8.3.2.37

cisco adaptive security appliance software 8.3.2.39

cisco adaptive security appliance software 8.2.5.26

cisco adaptive security appliance software 8.3.2

cisco adaptive security appliance software 8.3.2.33

cisco adaptive security appliance software 8.2.4

cisco adaptive security appliance software 8.3.2.41

cisco adaptive security appliance software 8.2.4.1

cisco adaptive security appliance software 8.2.3

cisco adaptive security appliance software 8.3.1.4

cisco adaptive security appliance software 8.3.2.34

cisco adaptive security appliance software 8.2.5.50

cisco adaptive security appliance software 8.2.5

cisco adaptive security appliance software 8.3.2.13

cisco adaptive security appliance software 8.2.5.13

cisco adaptive security appliance software 8.3.2.23

cisco adaptive security appliance software 8.3.2.31

cisco adaptive security appliance software 8.3.2.4

cisco adaptive security appliance software 8.2.2.17

cisco adaptive security appliance software 8.2.1.1

cisco adaptive security appliance software 8.2.2.16

cisco adaptive security appliance software 8.3.2.25

cisco adaptive security appliance software 8.2.5.46

cisco adaptive security appliance software 8.2.5.48

cisco adaptive security appliance software 8.2.0.45

cisco adaptive security appliance software 8.4.3

cisco adaptive security appliance software 8.4.4.9

cisco adaptive security appliance software 8.4.4

cisco adaptive security appliance software 8.4.1.3

cisco adaptive security appliance software 8.4.1.11

cisco adaptive security appliance software 8.4.7.22

cisco adaptive security appliance software 8.4.2.1

cisco adaptive security appliance software 8.4.4.1

cisco adaptive security appliance software 8.4.7

cisco adaptive security appliance software 8.4.5

cisco adaptive security appliance software 8.4.7.15

cisco adaptive security appliance software 8.4.4.5

cisco adaptive security appliance software 8.4.3.8

cisco adaptive security appliance software 8.4.3.9

cisco adaptive security appliance software 8.4.6

cisco adaptive security appliance software 8.4.5.6

cisco adaptive security appliance software 8.4.7.3

cisco adaptive security appliance software 8.4.4.3

cisco adaptive security appliance software 8.4.2.8

cisco adaptive security appliance software 8.4.1

cisco adaptive security appliance software 8.4.2

cisco adaptive security appliance software 8.7.1.4

cisco adaptive security appliance software 8.7.1.7

cisco adaptive security appliance software 8.7.1

cisco adaptive security appliance software 8.7.1.11

cisco adaptive security appliance software 8.7.1.3

cisco adaptive security appliance software 8.7.1.13

Vendor Advisories

A vulnerability in the function that exports environment variables of Cisco ASA Software could allow an authenticated, local attacker to inject a malicious library and take complete control of the system The vulnerability is due to improper setting of the LD_LIBRARY_PATH environment An attacker could exploit this vulnerability by copying a malic ...