Vulnerabilities > CVE-2014-0039 - Local Privilege Escalation vulnerability in fwsnort 'fwsnort.conf'

047910
CVSS 4.4 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
cipherdyne
nessus

Summary

Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory. Per: http://cwe.mitre.org/data/definitions/426.html "CWE-426: Untrusted Search Path"

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-1972.NASL
    descriptionnotes=Fix CVE-2014-0039 fwsnort: configuration file can be loaded from cwd when run as a non-root user Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-02-13
    plugin id72464
    published2014-02-13
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/72464
    titleFedora 19 : fwsnort-1.6.4-1.fc19 (2014-1972)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-1975.NASL
    descriptionFix CVE-2014-0039 fwsnort: configuration file can be loaded from cwd when run as a non-root user Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-02-13
    plugin id72465
    published2014-02-13
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/72465
    titleFedora 20 : fwsnort-1.6.4-1.fc20 (2014-1975)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2014-409.NASL
    descriptionUntrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory.
    last seen2020-06-01
    modified2020-06-02
    plugin id78352
    published2014-10-12
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/78352
    titleAmazon Linux AMI : fwsnort (ALAS-2014-409)

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 65341 CVE(CAN) ID: CVE-2014-0039 fwsnort是一个perl脚本,可疑将Snort规则转换为相同的iptables规则。 fwsnort 1.6.4之前版本在非root权限运行时,存在可疑搜索路径漏洞,可使本地用户通过当前工作目录内的木马fwsnort.conf,利用此漏洞执行任意代码。 0 fwsnort fwsnort 1.6.3 fwsnort fwsnort 厂商补丁: fwsnort ------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.cipherdyne.org/fwsnort/ https://github.com/mrash/fwsnort/commit/fa977453120cc48e1654f373311f9cac468d3348
idSSV:61491
last seen2017-11-19
modified2014-02-20
published2014-02-20
reporterRoot
titlefwsnort 'fwsnort.conf'本地权限提升漏洞