An unspecified setuid root helper in Enlightenment before 0.17.6 allows local users to gain privileges by leveraging failure to properly sanitize the environment.
References
Configurations
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2014/02/03/19 - Mailing List | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1059410 - Issue Tracking | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/91216 - VDB Entry | |
References | () https://git.enlightenment.org/core/enlightenment.git/commit/?id=666df815cd86a50343859bce36c5cf968c5f38b0 - Patch | |
References | () https://git.enlightenment.org/core/enlightenment.git/commit/?id=bb4a21e98656fe2c7d98ba2163e6defe9a630e2b - Patch |
Information
Published : 2018-04-27 16:29
Updated : 2024-11-21 02:05
NVD link : CVE-2014-1845
Mitre link : CVE-2014-1845
CVE.ORG link : CVE-2014-1845
JSON object : View
Products Affected
enlightenment
- enlightenment
CWE
CWE-264
Permissions, Privileges, and Access Controls