fish (aka fish-shell) 2.0.0 before 2.1.1 does not restrict access to the configuration service (aka fish_config), which allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by set_prompt.
References
Link Resource
http://www.openwall.com/lists/oss-security/2014/04/28/4 Mailing List Third Party Advisory
https://github.com/fish-shell/fish-shell/issues/1438 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-01-28T15:21:21

Updated: 2020-01-28T15:32:17

Reserved: 2014-04-18T00:00:00


Link: CVE-2014-2914

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-01-28T16:15:12.197

Modified: 2020-02-04T17:09:46.907


Link: CVE-2014-2914

JSON object: View

cve-icon Redhat Information

No data.

CWE