Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2014.0404
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2014-0404)
Resumen:The remote host is missing an update for the 'fish' package(s) announced via the MGASA-2014-0404 advisory.
Descripción:Summary:
The remote host is missing an update for the 'fish' package(s) announced via the MGASA-2014-0404 advisory.

Vulnerability Insight:
Updated fish packages fix security vulnerability:

fish, from at least version 1.16.0 to version 2.1.0 (inclusive), does not
check the credentials of processes communicating over the fishd universal
variable server UNIX domain socket. This allows a local attacker to
elevate their privileges to those of a target user running fish, including
root (CVE-2014-2905).

fish, from at least version 1.16.0 to version 2.1.0 (inclusive), creates
temporary files in an insecure manner.

Versions 1.23.0 to 2.1.0 (inclusive) execute code via `funced` from these
temporary files, allowing privilege escalation to those of any user
running fish, including root (CVE-2014-3856).

Additionally, from at least version 1.16.0 to version 2.1.0 (inclusive),
fish will read data using the psub function from these temporary files,
meaning that the input of commands used with the psub function is under
the control of the attacker (CVE-2014-2906).

fish, from version 2.0.0 to version 2.1.0 (inclusive), fails to restrict
connections to the Web-based configuration service (fish_config). This
allows remote attackers to execute arbitrary code in the context of the
user running fish_config (CVE-2014-2914).

The service is generally only running for short periods of time. The use of
the fish_config tool is optional as other interfaces to fish configuration
are available.

The fish package has been updated to version 2.1.1 to fix these issues.

Affected Software/OS:
'fish' package(s) on Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2014-2905
http://www.openwall.com/lists/oss-security/2014/04/28/4
SuSE Security Announcement: openSUSE-SU-2019:2177 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html
SuSE Security Announcement: openSUSE-SU-2019:2188 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-2906
https://github.com/fish-shell/fish-shell/issues/1437
Common Vulnerability Exposure (CVE) ID: CVE-2014-2914
Common Vulnerability Exposure (CVE) ID: CVE-2014-3856
https://www.openwall.com/lists/oss-security/2014/04/28/4
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.