Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2014-2524

The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 36.9%
CVSS Severity
CVSS v2 Score 3.3
References
Products affected by CVE-2014-2524
  • Gnu » Readline » Version: 2.1
    cpe:2.3:a:gnu:readline:2.1
  • Gnu » Readline » Version: 2.2
    cpe:2.3:a:gnu:readline:2.2
  • Gnu » Readline » Version: 4.0
    cpe:2.3:a:gnu:readline:4.0
  • Gnu » Readline » Version: 4.1
    cpe:2.3:a:gnu:readline:4.1
  • Gnu » Readline » Version: 4.2
    cpe:2.3:a:gnu:readline:4.2
  • Gnu » Readline » Version: 4.3
    cpe:2.3:a:gnu:readline:4.3
  • Gnu » Readline » Version: 5.0
    cpe:2.3:a:gnu:readline:5.0
  • Gnu » Readline » Version: 5.1
    cpe:2.3:a:gnu:readline:5.1
  • Gnu » Readline » Version: 5.2
    cpe:2.3:a:gnu:readline:5.2
  • Gnu » Readline » Version: 6.0
    cpe:2.3:a:gnu:readline:6.0
  • Gnu » Readline » Version: 6.1
    cpe:2.3:a:gnu:readline:6.1
  • Gnu » Readline » Version: 6.2
    cpe:2.3:a:gnu:readline:6.2
  • Gnu » Readline » Version: 6.3
    cpe:2.3:a:gnu:readline:6.3
  • Fedoraproject » Fedora » Version: 20
    cpe:2.3:o:fedoraproject:fedora:20
  • Mageia » Mageia » Version: 3.0
    cpe:2.3:o:mageia:mageia:3.0
  • Mageia » Mageia » Version: 4.0
    cpe:2.3:o:mageia:mageia:4.0
  • Opensuse » Opensuse » Version: 12.3
    cpe:2.3:o:opensuse:opensuse:12.3
  • Opensuse » Opensuse » Version: 13.1
    cpe:2.3:o:opensuse:opensuse:13.1


Contact Us

Shodan ® - All rights reserved