CVE-2014-2581

Smb4K before 1.1.1 allows remote attackers to obtain credentials via vectors related to the cuid option in the "Additional options" line edit.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:smb4k_project:smb4k:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*

History

21 Nov 2024, 02:06

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-June/133898.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2014-June/133898.html - Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-June/133901.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2014-June/133901.html - Mailing List, Third Party Advisory
References () http://sourceforge.net/projects/smb4k/files/1.1.1/ - Release Notes, Third Party Advisory () http://sourceforge.net/projects/smb4k/files/1.1.1/ - Release Notes, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2014/03/24/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/03/24/1 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2014/03/25/5 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/03/25/5 - Mailing List, Third Party Advisory
References () https://bugs.gentoo.org/505376 - Issue Tracking, Patch, Third Party Advisory () https://bugs.gentoo.org/505376 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2020-01-28 15:15

Updated : 2024-11-21 02:06


NVD link : CVE-2014-2581

Mitre link : CVE-2014-2581

CVE.ORG link : CVE-2014-2581


JSON object : View

Products Affected

smb4k_project

  • smb4k

fedoraproject

  • fedora
CWE
CWE-522

Insufficiently Protected Credentials