CVE-2014-2095

Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, when a Fedora package such as 0.8.2-1 is not used, allows local users to gain privileges via a Trojan horse bin/catfish.pyc under the current working directory.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
VendorProductVersion
catfish_projectcatfish
0.6.0
catfish_projectcatfish
0.6.1
catfish_projectcatfish
0.6.2
catfish_projectcatfish
0.6.3
catfish_projectcatfish
0.6.4
catfish_projectcatfish
0.8.0
catfish_projectcatfish
0.8.1
catfish_projectcatfish
0.8.2
catfish_projectcatfish
1.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
catfish
bullseye
4.16.0-1
fixed
bookworm
4.16.4-2
fixed
sid
4.16.4-2
fixed
trixie
4.16.4-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
catfish
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
ignored
vivid
ignored
utopic
ignored
trusty
dne
saucy
ignored
quantal
ignored
precise
ignored
lucid
ignored