Smb4K before 1.1.1 allows remote attackers to obtain credentials via vectors related to the cuid option in the "Additional options" line edit.
References
Configurations
History
21 Nov 2024, 02:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2014-June/133898.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2014-June/133901.html - Mailing List, Third Party Advisory | |
References | () http://sourceforge.net/projects/smb4k/files/1.1.1/ - Release Notes, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2014/03/24/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2014/03/25/5 - Mailing List, Third Party Advisory | |
References | () https://bugs.gentoo.org/505376 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2020-01-28 15:15
Updated : 2024-11-21 02:06
NVD link : CVE-2014-2581
Mitre link : CVE-2014-2581
CVE.ORG link : CVE-2014-2581
JSON object : View
Products Affected
smb4k_project
- smb4k
fedoraproject
- fedora
CWE
CWE-522
Insufficiently Protected Credentials