fish (aka fish-shell) 2.0.0 before 2.1.1 does not restrict access to the configuration service (aka fish_config), which allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by set_prompt.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/04/28/4 | Mailing List Third Party Advisory |
https://github.com/fish-shell/fish-shell/issues/1438 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-01-28T15:21:21
Updated: 2020-01-28T15:32:17
Reserved: 2014-04-18T00:00:00
Link: CVE-2014-2914
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-01-28T16:15:12.197
Modified: 2020-02-04T17:09:46.907
Link: CVE-2014-2914
JSON object: View
Redhat Information
No data.
CWE