First published: Sun Jun 08 2014(Updated: )
include/tests_webservers in Lynis before 1.5.5 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/lynis.*.unsorted file with an easily determined name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CISOfy Lynis | <=1.5.4 | |
CISOfy Lynis | =1.5.0 | |
CISOfy Lynis | =1.5.1 | |
CISOfy Lynis | =1.5.2 | |
CISOfy Lynis | =1.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3986 is considered to be of medium severity due to the risk of local users exploiting the symlink vulnerability to overwrite arbitrary files.
To fix CVE-2014-3986, upgrade Lynis to version 1.5.5 or later, which mitigates the symlink attack.
Users of Lynis versions prior to 1.5.5 are affected by CVE-2014-3986.
The impact of CVE-2014-3986 includes potential unauthorized access and modification of sensitive files by local users.
CVE-2014-3986 was publicly disclosed in June 2014.