CVE-2014-8169Improper Input Validation in Project Automount

Severity
4.4MEDIUMNVD
EPSS
0.1%
top 70.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 18
Latest updateMay 14

Description

automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.

CVSS vector

AV:L/AC:M/C:P/I:P/A:PExploitability: 3.4 | Impact: 6.4

Affected Packages6 packages

🔴Vulnerability Details

3
GHSA
GHSA-q56m-rhvg-jwg2: automount 52022-05-14
CVEList
CVE-2014-8169: automount 52015-03-18
OSV
CVE-2014-8169: automount 52015-03-18

📋Vendor Advisories

3
Ubuntu
autofs vulnerability2015-04-27
Red Hat
autofs: priv escalation via interpreter load path for program based automount maps2015-03-02
Debian
CVE-2014-8169: autofs - automount 5.0.8, when a program map uses certain interpreted languages, uses the...2014

💬Community

1
Bugzilla
CVE-2014-8169 autofs: priv escalation via interpreter load path for program based automount maps2015-02-13
CVE-2014-8169 — Improper Input Validation | cvebase