CVE-2014-0039
08.02.2014, 00:55
Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory.Enginsight
Vendor | Product | Version |
---|---|---|
cipherdyne | fwsnort | 𝑥 ≤ 1.6.4 |
cipherdyne | fwsnort | 0.5 |
cipherdyne | fwsnort | 0.6 |
cipherdyne | fwsnort | 0.6.1 |
cipherdyne | fwsnort | 0.6.2 |
cipherdyne | fwsnort | 0.6.3 |
cipherdyne | fwsnort | 0.6.4 |
cipherdyne | fwsnort | 0.6.5 |
cipherdyne | fwsnort | 0.7.0 |
cipherdyne | fwsnort | 0.8.0 |
cipherdyne | fwsnort | 0.8.1 |
cipherdyne | fwsnort | 0.8.2 |
cipherdyne | fwsnort | 0.9.0 |
cipherdyne | fwsnort | 1.0 |
cipherdyne | fwsnort | 1.0.1 |
cipherdyne | fwsnort | 1.0.2 |
cipherdyne | fwsnort | 1.0.3 |
cipherdyne | fwsnort | 1.0.4 |
cipherdyne | fwsnort | 1.0.5 |
cipherdyne | fwsnort | 1.0.6 |
cipherdyne | fwsnort | 1.5 |
cipherdyne | fwsnort | 1.6 |
cipherdyne | fwsnort | 1.6.1 |
cipherdyne | fwsnort | 1.6.2 |
cipherdyne | fwsnort | 1.6.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References