CVE-2014-1624
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Race condition in the xdg.BaseDirectory.get_runtime_dir function in python-xdg 0.25 allows local users to overwrite arbitrary files by pre-creating /tmp/pyxdg-runtime-dir-fallback-victim to point to a victim-owned location, then replacing it with a symlink to an attacker-controlled location once the get_runtime_dir function is called.
Condición de carrera en la función xdg.BaseDirectory.get_runtime_dir en python-xdg 0.25 permite a usuarios locales sobreescribir archivos arbitrarios mediante la pre-creación /tmp/pyxdg-runtime-dir-fallback-victim para apuntar a una localización victim-owned, después reemplazándolo con un symlink hacia una localización controlada por el atacante una vez es llamada la función get_runtime_dir.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-01-21 CVE Reserved
- 2014-01-28 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736247 | X_refsource_misc | |
http://www.openwall.com/lists/oss-security/2014/01/21/3 | Mailing List | |
http://www.openwall.com/lists/oss-security/2014/01/21/4 | Mailing List | |
http://www.securityfocus.com/bid/65042 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90618 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|