{
  "threat_severity" : "Moderate",
  "public_date" : "2015-03-02T00:00:00Z",
  "bugzilla" : {
    "description" : "autofs: priv escalation via interpreter load path for program based automount maps",
    "id" : "1192565",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1192565"
  },
  "cvss" : {
    "cvss_base_score" : "4.6",
    "cvss_scoring_vector" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-20->CWE-426",
  "details" : [ "automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.", "It was found that program-based automounter maps that used interpreted languages such as Python would use standard environment variables to locate and load modules of those languages. A local attacker could potentially use this flaw to escalate their privileges on the system." ],
  "statement" : "This issue does not affect the version of autofs package as shipped with Red Hat Enterprise Linux 5.",
  "acknowledgement" : "Red Hat would like to thank Georgia Institute (Technology) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2015-07-20T00:00:00Z",
    "advisory" : "RHSA-2015:1344",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "autofs-1:5.0.5-113.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2015-11-19T00:00:00Z",
    "advisory" : "RHSA-2015:2417",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "autofs-1:5.0.7-54.el7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "autofs",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2014-8169\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-8169" ],
  "name" : "CVE-2014-8169",
  "csaw" : false
}