Untrusted search path - CVE-2014-3248
Published: June 6, 2017
Vulnerability identifier: #VU6949
CSH Severity: Low
CVSS v4.0:
CVE-ID: CVE-2014-3248
CWE-ID: CWE-426
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor:
Affected software:
Detailed vulnerability description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to untrusted search path when handling malicious file. A local attacker can use a Trojan horse file to gain root privileges and possibly execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to untrusted search path when handling malicious file. A local attacker can use a Trojan horse file to gain root privileges and possibly execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
How to mitigate CVE-2014-3248
Update to version 2.8.7, 3.6.2 or later.