![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2014-3219 |
Description: | fish before 2.1.1 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/fishd.log.%s, (2) /tmp/.pac-cache.$USER, (3) /tmp/.yum-cache.$USER, or (4) /tmp/.rpm-cache.$USER. |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-3219 BugTraq ID: 67115 http://www.securityfocus.com/bid/67115 http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132751.html http://security.gentoo.org/glsa/glsa-201412-49.xml http://www.openwall.com/lists/oss-security/2014/05/06/3 http://www.openwall.com/lists/oss-security/2014/09/28/8 SuSE Security Announcement: openSUSE-SU-2019:2177 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html SuSE Security Announcement: openSUSE-SU-2019:2188 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html |