First published: Tue Jan 28 2014(Updated: )
Race condition in the `xdg.BaseDirectory.get_runtime_dir` function in pyxdg 0.25 allows local users to overwrite arbitrary files by pre-creating `/tmp/pyxdg-runtime-dir-fallback-victim` to point to a victim-owned location, then replacing it with a symlink to an attacker-controlled location once the `get_runtime_dir` function is called.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Pyxdg | =0.25 | |
pip/pyxdg | <=0.25 | 0.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1624 is classified as a high severity vulnerability due to its potential for local users to overwrite arbitrary files.
To fix CVE-2014-1624, upgrade pyxdg to version 0.26 or later.
CVE-2014-1624 affects users running pyxdg version 0.25 or earlier.
CVE-2014-1624 is a race condition vulnerability.
No, CVE-2014-1624 requires local user access for exploitation.