CVE-2014-2581

Smb4K before 1.1.1 allows remote attackers to obtain credentials via vectors related to the cuid option in the "Additional options" line edit.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/133898.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/133901.html Mailing List Third Party Advisory
http://sourceforge.net/projects/smb4k/files/1.1.1/ Release Notes Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/03/24/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/03/25/5 Mailing List Third Party Advisory
https://bugs.gentoo.org/505376 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:smb4k_project:smb4k:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-01-28 15:15

Updated : 2024-02-28 17:28


NVD link : CVE-2014-2581

Mitre link : CVE-2014-2581

CVE.ORG link : CVE-2014-2581


JSON object : View

Products Affected

fedoraproject

  • fedora

smb4k_project

  • smb4k
CWE
CWE-522

Insufficiently Protected Credentials