First published: Thu May 08 2014(Updated: )
lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mageia | =3 | |
Mageia | =4 | |
Emacs | <=24.3 | |
Emacs | =20.0 | |
Emacs | =20.1 | |
Emacs | =20.2 | |
Emacs | =20.3 | |
Emacs | =20.4 | |
Emacs | =20.5 | |
Emacs | =20.6 | |
Emacs | =20.7 | |
Emacs | =21 | |
Emacs | =21.1 | |
Emacs | =21.2 | |
Emacs | =21.2.1 | |
Emacs | =21.3 | |
Emacs | =21.3.1 | |
Emacs | =21.4 | |
Emacs | =22.1 | |
Emacs | =22.2 | |
Emacs | =22.3 | |
Emacs | =23.1 | |
Emacs | =23.2 | |
Emacs | =23.3 | |
Emacs | =23.4 | |
Emacs | =24.1 | |
Emacs | =24.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3424 is considered a medium severity vulnerability due to its potential to allow local users to overwrite arbitrary files through a symlink attack.
To address CVE-2014-3424, you should upgrade to a version of GNU Emacs that is later than 24.3, as this vulnerability has been patched in subsequent releases.
CVE-2014-3424 affects local users on GNU Emacs versions 24.3 and earlier, as well as certain versions of Mageia.
CVE-2014-3424 is caused by a flaw in the handling of temporary files in tramp-sh.el, which allows symlink attacks.
No, CVE-2014-3424 is not a remote vulnerability; it requires local access to exploit.