CVE-2014-2524
Mandriva Linux Security Advisory 2014-154
Severity Score
5.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
La función _rl_tropen en util.c en GNU readline anterior a 6.3 patch 3 permite a usuarios locales crear o sobrescribir ficheros arbitrarios a través de un ataque de enlace simbólico sobre un fichero /var/tmp/rltrace.[PID].
Steve Kemp discovered the _rl_tropen() function in readline insecurely handled a temporary file. This could allow a local attacker to perform symbolic link attacks. Also, upstream patches have been added to fix an infinite loop in vi input mode, and to fix an issue with slowness when pasting text.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2014-03-17 CVE Reserved
- 2014-08-08 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://advisories.mageia.org/MGASA-2014-0319.html | Third Party Advisory | |
http://seclists.org/oss-sec/2014/q1/579 | Mailing List |
|
http://seclists.org/oss-sec/2014/q1/587 | Mailing List |
|
https://bugzilla.redhat.com/show_bug.cgi?id=1077023 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html | 2018-10-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mageia Search vendor "Mageia" | Mageia Search vendor "Mageia" for product "Mageia" | 3.0 Search vendor "Mageia" for product "Mageia" and version "3.0" | - |
Affected
| ||||||
Mageia Search vendor "Mageia" | Mageia Search vendor "Mageia" for product "Mageia" | 4.0 Search vendor "Mageia" for product "Mageia" and version "4.0" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | <= 6.3 Search vendor "Gnu" for product "Readline" and version " <= 6.3" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 2.1 Search vendor "Gnu" for product "Readline" and version "2.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 2.2 Search vendor "Gnu" for product "Readline" and version "2.2" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 4.0 Search vendor "Gnu" for product "Readline" and version "4.0" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 4.1 Search vendor "Gnu" for product "Readline" and version "4.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 4.2 Search vendor "Gnu" for product "Readline" and version "4.2" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 4.2 Search vendor "Gnu" for product "Readline" and version "4.2" | a |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 4.3 Search vendor "Gnu" for product "Readline" and version "4.3" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 5.0 Search vendor "Gnu" for product "Readline" and version "5.0" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 5.1 Search vendor "Gnu" for product "Readline" and version "5.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 5.2 Search vendor "Gnu" for product "Readline" and version "5.2" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 6.0 Search vendor "Gnu" for product "Readline" and version "6.0" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 6.1 Search vendor "Gnu" for product "Readline" and version "6.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Readline Search vendor "Gnu" for product "Readline" | 6.2 Search vendor "Gnu" for product "Readline" and version "6.2" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 12.3 Search vendor "Opensuse" for product "Opensuse" and version "12.3" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.1 Search vendor "Opensuse" for product "Opensuse" and version "13.1" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 20 Search vendor "Fedoraproject" for product "Fedora" and version "20" | - |
Affected
|