First published: Thu May 08 2014(Updated: )
lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Emacs | <=24.3 | |
Emacs | =20.0 | |
Emacs | =20.1 | |
Emacs | =20.2 | |
Emacs | =20.3 | |
Emacs | =20.4 | |
Emacs | =20.5 | |
Emacs | =20.6 | |
Emacs | =20.7 | |
Emacs | =21 | |
Emacs | =21.1 | |
Emacs | =21.2 | |
Emacs | =21.2.1 | |
Emacs | =21.3 | |
Emacs | =21.3.1 | |
Emacs | =21.4 | |
Emacs | =22.1 | |
Emacs | =22.2 | |
Emacs | =22.3 | |
Emacs | =23.1 | |
Emacs | =23.2 | |
Emacs | =23.3 | |
Emacs | =23.4 | |
Emacs | =24.1 | |
Emacs | =24.2 | |
Mageia | =3 | |
Mageia | =4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3422 has been classified as a medium severity vulnerability due to its potential for local file overwrite via symlink attacks.
To fix CVE-2014-3422, you should upgrade to GNU Emacs version 24.4 or later, which addresses this vulnerability.
CVE-2014-3422 affects local users of GNU Emacs versions 24.3 and earlier, and select version 20.x to 23.x releases.
CVE-2014-3422 involves a symlink attack that allows local users to overwrite arbitrary files.
CVE-2014-3422 was discovered in May 2014.