First published: Wed Jan 29 2014(Updated: )
Jakub Wilk discovered two instances in tag.py where temporary files were created insecurely via mktemp(). A local attacker could use this flaw to perform a symbolic link attack to modify an arbitrary file. Further details are available in the original report: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737062">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737062</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/eyeD3 | <0.7.5 | 0.7.5 |
eyeD3 | <=0.6.18 | |
eyeD3 | =0.1.0 | |
eyeD3 | =0.2.0 | |
eyeD3 | =0.3.0 | |
eyeD3 | =0.3.1 | |
eyeD3 | =0.4.0 | |
eyeD3 | =0.5.0 | |
eyeD3 | =0.5.1 | |
eyeD3 | =0.6.0 | |
eyeD3 | =0.6.0-rc1 | |
eyeD3 | =0.6.1 | |
eyeD3 | =0.6.2 | |
eyeD3 | =0.6.3 | |
eyeD3 | =0.6.4 | |
eyeD3 | =0.6.5 | |
eyeD3 | =0.6.6 | |
eyeD3 | =0.6.8 | |
eyeD3 | =0.6.9 | |
eyeD3 | =0.6.10 | |
eyeD3 | =0.6.11 | |
eyeD3 | =0.6.12 | |
eyeD3 | =0.6.13 | |
eyeD3 | =0.6.14 | |
eyeD3 | =0.6.15 | |
eyeD3 | =0.6.16 | |
eyeD3 | =0.6.17 | |
eyeD3 | =0.7.3 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
debian/eyed3 | 0.8.10-4 0.9.7-1 0.9.7-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1934 has a medium severity rating as it allows local attackers to exploit symbolic link attacks.
To fix CVE-2014-1934, upgrade to a patched version of the affected software beyond 0.7.5 for eyeD3 or 0.8.10-4 and 0.9.7-1 for eyed3.
CVE-2014-1934 affects versions of eyeD3 prior to 0.7.5 and versions of eyed3 before 0.8.10-4 and 0.9.7-1.
CVE-2014-1934 was discovered by Jakub Wilk, highlighting insecure file creation using mktemp().
CVE-2014-1934 can enable symbolic link attacks allowing local attackers to modify arbitrary files.