![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2014.0404 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2014-0404) |
Summary: | The remote host is missing an update for the 'fish' package(s) announced via the MGASA-2014-0404 advisory. |
Description: | Summary: The remote host is missing an update for the 'fish' package(s) announced via the MGASA-2014-0404 advisory. Vulnerability Insight: Updated fish packages fix security vulnerability: fish, from at least version 1.16.0 to version 2.1.0 (inclusive), does not check the credentials of processes communicating over the fishd universal variable server UNIX domain socket. This allows a local attacker to elevate their privileges to those of a target user running fish, including root (CVE-2014-2905). fish, from at least version 1.16.0 to version 2.1.0 (inclusive), creates temporary files in an insecure manner. Versions 1.23.0 to 2.1.0 (inclusive) execute code via `funced` from these temporary files, allowing privilege escalation to those of any user running fish, including root (CVE-2014-3856). Additionally, from at least version 1.16.0 to version 2.1.0 (inclusive), fish will read data using the psub function from these temporary files, meaning that the input of commands used with the psub function is under the control of the attacker (CVE-2014-2906). fish, from version 2.0.0 to version 2.1.0 (inclusive), fails to restrict connections to the Web-based configuration service (fish_config). This allows remote attackers to execute arbitrary code in the context of the user running fish_config (CVE-2014-2914). The service is generally only running for short periods of time. The use of the fish_config tool is optional as other interfaces to fish configuration are available. The fish package has been updated to version 2.1.1 to fix these issues. Affected Software/OS: 'fish' package(s) on Mageia 4. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-2905 http://www.openwall.com/lists/oss-security/2014/04/28/4 SuSE Security Announcement: openSUSE-SU-2019:2177 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html SuSE Security Announcement: openSUSE-SU-2019:2188 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html Common Vulnerability Exposure (CVE) ID: CVE-2014-2906 https://github.com/fish-shell/fish-shell/issues/1437 Common Vulnerability Exposure (CVE) ID: CVE-2014-2914 Common Vulnerability Exposure (CVE) ID: CVE-2014-3856 https://www.openwall.com/lists/oss-security/2014/04/28/4 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |