First published: Fri Feb 09 2018(Updated: )
fish before 2.1.1 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/fishd.log.%s, (2) /tmp/.pac-cache.$USER, (3) /tmp/.yum-cache.$USER, or (4) /tmp/.rpm-cache.$USER.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fishshell Fish | <2.1.1 | |
Fedoraproject Fedora | =19 | |
debian/fish | 3.1.2-3+deb11u1 3.6.0-3.1+deb12u1 3.7.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3219 is a vulnerability in fishshell before version 2.1.1 that allows local users to write to arbitrary files through a symlink attack.
CVE-2014-3219 has a severity rating of 7.8 (high).
Fishshell versions before 2.1.1, Debian 3.0.2-2+deb10u1, Debian 3.1.2-3+deb11u1, Debian 3.6.0-3.1, Debian 3.6.1-1, Fishshell 2.1.1, Fedora 19.
Local users can exploit CVE-2014-3219 by creating symlinks to arbitrary files, allowing them to write to those files.
You can find more information about CVE-2014-3219 at the following references: [1] https://security-tracker.debian.org/tracker/CVE-2014-3219 [2] http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132751.html [3] http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html