Vulnerability Name: | CVE-2014-6311 (CCN-95784) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2014-09-07 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2014-09-07 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2020-08-18 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | generate_doygen.pl in ace before 6.2.7+dfsg-2 creates predictable file names in the /tmp directory which allows attackers to gain elevated privileges. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:UR)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P/E:H/RL:U/RC:UR)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-330 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | File Manipulation | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-6311 Source: CCN Type: oss-security Mailing List, Sun, 7 Sep 2014 09:47:39 +0200 CVE request: /tmp file vulnerability in ace Source: MISC Type: Mailing List, Third Party Advisory http://www.openwall.com/lists/oss-security/2014/09/11/5 Source: MISC Type: Mailing List, Third Party Advisory http://www.openwall.com/lists/oss-security/2014/09/12/6 Source: CCN Type: BID-69656 Debian ACE Package Insecure Temporary File Creation Privilege Escalation Vulnerability Source: CCN Type: Debian Bug report logs 760709 /tmp file vulnerability in generate_doxygen.pl Source: MISC Type: Third Party Advisory https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=760709 Source: XF Type: UNKNOWN ace-cve20146311-symlink(95784) Source: MISC Type: Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2014-6311 Source: CCN Type: WhiteSource Vulnerability Database CVE-2014-6311 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |