![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2014.0404 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2014-0404) |
Zusammenfassung: | The remote host is missing an update for the 'fish' package(s) announced via the MGASA-2014-0404 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'fish' package(s) announced via the MGASA-2014-0404 advisory. Vulnerability Insight: Updated fish packages fix security vulnerability: fish, from at least version 1.16.0 to version 2.1.0 (inclusive), does not check the credentials of processes communicating over the fishd universal variable server UNIX domain socket. This allows a local attacker to elevate their privileges to those of a target user running fish, including root (CVE-2014-2905). fish, from at least version 1.16.0 to version 2.1.0 (inclusive), creates temporary files in an insecure manner. Versions 1.23.0 to 2.1.0 (inclusive) execute code via `funced` from these temporary files, allowing privilege escalation to those of any user running fish, including root (CVE-2014-3856). Additionally, from at least version 1.16.0 to version 2.1.0 (inclusive), fish will read data using the psub function from these temporary files, meaning that the input of commands used with the psub function is under the control of the attacker (CVE-2014-2906). fish, from version 2.0.0 to version 2.1.0 (inclusive), fails to restrict connections to the Web-based configuration service (fish_config). This allows remote attackers to execute arbitrary code in the context of the user running fish_config (CVE-2014-2914). The service is generally only running for short periods of time. The use of the fish_config tool is optional as other interfaces to fish configuration are available. The fish package has been updated to version 2.1.1 to fix these issues. Affected Software/OS: 'fish' package(s) on Mageia 4. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-2905 http://www.openwall.com/lists/oss-security/2014/04/28/4 SuSE Security Announcement: openSUSE-SU-2019:2177 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html SuSE Security Announcement: openSUSE-SU-2019:2188 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html Common Vulnerability Exposure (CVE) ID: CVE-2014-2906 https://github.com/fish-shell/fish-shell/issues/1437 Common Vulnerability Exposure (CVE) ID: CVE-2014-2914 Common Vulnerability Exposure (CVE) ID: CVE-2014-3856 https://www.openwall.com/lists/oss-security/2014/04/28/4 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |