← Voltar para CVEs
CVE-2014-8169
N/ADescricao
automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado3/18/2015
Ultima modificacao5/6/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
automount_project:automountopensuse:opensuseredhat:enterprise_linux_desktopredhat:enterprise_linux_hpc_noderedhat:enterprise_linux_serverredhat:enterprise_linux_workstation
Fraquezas (CWE)
CWE-264
Referencias
http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-1344.html(secalert@redhat.com)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html(secalert@redhat.com)
http://www.securityfocus.com/bid/73211(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-2579-1(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1192565(secalert@redhat.com)
https://bugzilla.suse.com/show_bug.cgi?id=917977(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1344.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/73211(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2579-1(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1192565(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.suse.com/show_bug.cgi?id=917977(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.