CWE
264 362
Advisory Published
CVE Published
Updated

CVE-2014-2905: Race Condition

First published: Mon Apr 28 2014(Updated: )

A number of vulnerabilities were reported in fish versions prior to 2.1.1 [1]: CVE-2014-2905: fish universal variable socket vulnerable to permission bypass leading to privilege escalation fish, from at least version 1.16.0 to version 2.1.0 (inclusive), does not check the credentials of processes communicating over the fishd universal variable server UNIX domain socket. This allows a local attacker to elevate their privileges to those of a target user running fish, including root. fish version 2.1.1 is not vulnerable. No workaround is currently available for earlier versions of fish. <a href="https://github.com/fish-shell/fish-shell/issues/1436">https://github.com/fish-shell/fish-shell/issues/1436</a> CVE-2014-2906: fish temporary file creation vulnerable to race condition leading to privilege escalation fish, from at least version 1.16.0 to version 2.1.0 (inclusive), creates temporary files in an insecure manner. Versions 1.23.0 to 2.1.0 (inclusive) execute code from these temporary files, allowing privilege escalation to those of any user running fish, including root. Additionally, from at least version 1.16.0 to version 2.1.0 (inclusive), fish will read data using the psub function from these temporary files, meaning that the input of commands used with the psub function is under the control of the attacker. fish version 2.1.1 is not vulnerable. No workaround is currently available for earlier versions of fish. <a href="https://github.com/fish-shell/fish-shell/issues/1437">https://github.com/fish-shell/fish-shell/issues/1437</a> CVE-2014-2914: fish web interface does not restrict access leading to remote code execution fish, from version 2.0.0 to version 2.1.0 (inclusive), fails to restrict connections to the Web-based configuration service (fish_config). This allows remote attackers to execute arbitrary code in the context of the user running fish_config. The service is generally only running for short periods of time. fish version 2.1.1 restricts incoming connections to localhost only. At this stage, users should avoid running fish_config on systems where there are untrusted local users, as they are still able to connect to the fish_config service and elevate their privileges to those of the user running fish_config. No workaround is currently available for earlier versions of fish, although the use of the fish_config tool is optional as other interfaces to fish configuration are available. <a href="https://github.com/fish-shell/fish-shell/issues/1438">https://github.com/fish-shell/fish-shell/issues/1438</a> The patches going into 2.1.1 can be retrieved from the Integration_2.1.1 branch on Github if you would like to patch your own source or packages without updating to 2.1.1: <a href="https://github.com/fish-shell/fish-shell/tree/Integration_2.1.1">https://github.com/fish-shell/fish-shell/tree/Integration_2.1.1</a> 10642a34f17ae45bd93be3ae6021ee920d3da0c2 8412c867a501e3a68e55fef6215e86d3ac9f617b c0989dce2d882c94eb3183e7b94402ba53534abb Although at this stage we won't be issuing a 2.0.1 release, the patches have been backported to the 2.0.0 branch for distributions that would prefer not to upgrade to the 2.1 series: <a href="https://github.com/fish-shell/fish-shell/tree/Integration_2.0.1">https://github.com/fish-shell/fish-shell/tree/Integration_2.0.1</a> 216d32055d99fbae563ad048436830187a8bfceb aea9ad4965d24ef9c4e346f906194820bac70cc9 55986120aa2cc8ab0809db8ca1f8116491c1fb14 [1] <a href="http://www.openwall.com/lists/oss-security/2014/04/28/4">http://www.openwall.com/lists/oss-security/2014/04/28/4</a>

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Fishshell Fish=1.16.0
Fishshell Fish=2.0.0
redhat/fish<2.1.1
2.1.1
debian/fish
3.1.2-3+deb11u1
3.6.0-3.1+deb12u1
3.7.1-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203