First published: Thu May 08 2014(Updated: )
lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mageia | =3 | |
Mageia | =4 | |
Emacs | <=24.3 | |
Emacs | =20.0 | |
Emacs | =20.1 | |
Emacs | =20.2 | |
Emacs | =20.3 | |
Emacs | =20.4 | |
Emacs | =20.5 | |
Emacs | =20.6 | |
Emacs | =20.7 | |
Emacs | =21 | |
Emacs | =21.1 | |
Emacs | =21.2 | |
Emacs | =21.2.1 | |
Emacs | =21.3 | |
Emacs | =21.3.1 | |
Emacs | =21.4 | |
Emacs | =22.1 | |
Emacs | =22.2 | |
Emacs | =22.3 | |
Emacs | =23.1 | |
Emacs | =23.2 | |
Emacs | =23.3 | |
Emacs | =23.4 | |
Emacs | =24.1 | |
Emacs | =24.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3423 has a medium severity level due to its potential for local file overwriting through a symlink attack.
To fix CVE-2014-3423, you should upgrade to a version of GNU Emacs later than 24.3 or apply the recommended patches.
CVE-2014-3423 affects local users of GNU Emacs versions 24.3 and earlier as well as Mageia versions 3 and 4.
CVE-2014-3423 is a symlink vulnerability that allows unauthorized overwriting of files.
No, CVE-2014-3423 cannot be exploited remotely; it requires local access to the system.