CVE-2014-8169

Impact:
Moderate
Public Date:
2015-03-02
CWE:
CWE-20->CWE-426
Bugzilla:
1192565: CVE-2014-8169 autofs: priv escalation via interpreter load path for program based automount maps
It was found that program-based automounter maps that used interpreted languages such as Python would use standard environment variables to locate and load modules of those languages. A local attacker could potentially use this flaw to escalate their privileges on the system.

Find out more about CVE-2014-8169 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue does not affect the version of autofs package as shipped with Red Hat Enterprise Linux 5.

CVSS v2 metrics

Base Score 4.6
Base Metrics AV:L/AC:L/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (autofs) RHSA-2015:1344 2015-07-20
Red Hat Enterprise Linux 7 (autofs) RHSA-2015:2417 2015-11-19

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 autofs Not affected

Acknowledgements

Red Hat would like to thank the Georgia Institute of Technology for reporting this issue.
Last Modified