Vulnerabilites related to debian - kde4libs
Vulnerability from fkie_nvd
Published
2014-08-19 18:55
Modified
2024-11-21 02:11
Severity ?
Summary
KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and "PID reuse race conditions."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | kde4libs | - | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
kde | kauth | * | |
kde | kdelibs | * | |
kde | kdelibs | 4.10.0 | |
kde | kdelibs | 4.10.1 | |
kde | kdelibs | 4.10.2 | |
kde | kdelibs | 4.10.3 | |
kde | kdelibs | 4.10.95 | |
kde | kdelibs | 4.10.97 | |
kde | kdelibs | 4.11.0 | |
kde | kdelibs | 4.11.1 | |
kde | kdelibs | 4.11.2 | |
kde | kdelibs | 4.11.3 | |
kde | kdelibs | 4.11.4 | |
kde | kdelibs | 4.11.5 | |
kde | kdelibs | 4.11.80 | |
kde | kdelibs | 4.11.90 | |
kde | kdelibs | 4.11.95 | |
kde | kdelibs | 4.11.97 | |
kde | kdelibs | 4.12.0 | |
kde | kdelibs | 4.12.1 | |
kde | kdelibs | 4.12.2 | |
kde | kdelibs | 4.12.3 | |
kde | kdelibs | 4.12.4 | |
kde | kdelibs | 4.12.5 | |
kde | kdelibs | 4.12.80 | |
kde | kdelibs | 4.12.90 | |
kde | kdelibs | 4.12.95 | |
kde | kdelibs | 4.12.97 | |
kde | kdelibs | 4.13.0 | |
kde | kdelibs | 4.13.1 | |
kde | kdelibs | 4.13.2 | |
kde | kdelibs | 4.13.3 | |
kde | kdelibs | 4.13.80 | |
kde | kdelibs | 4.13.90 | |
kde | kdelibs | 4.13.95 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:debian:kde4libs:-:*:*:*:*:*:*:*", matchCriteriaId: "F69F6CA3-205F-4A3B-B1EE-87A93D87CE81", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", matchCriteriaId: "F5D324C4-97C7-49D3-A809-9EAD4B690C69", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:kde:kauth:*:*:*:*:*:*:*:*", matchCriteriaId: "B8DE7A5C-2C0F-4DD1-90E2-26891DC79575", versionEndIncluding: "5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:*:*:*:*:*:*:*:*", matchCriteriaId: "DED2728D-6EC3-4641-9972-F43AB4D1BB72", versionEndIncluding: "4.13.97", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.10.0:*:*:*:*:*:*:*", matchCriteriaId: "4A1BF2C7-0945-4325-9514-F2F37E8CE43B", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.10.1:*:*:*:*:*:*:*", matchCriteriaId: "B2C7808F-2203-43DF-808C-7A0B85367293", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.10.2:*:*:*:*:*:*:*", matchCriteriaId: "61937C14-55DF-4E30-947D-21EC3F418E62", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.10.3:*:*:*:*:*:*:*", matchCriteriaId: "FD7ECC09-0985-44AA-909E-86981CC13A9D", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.10.95:*:*:*:*:*:*:*", matchCriteriaId: "3A7D10AF-E305-41F4-9154-7071E684C6B6", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.10.97:*:*:*:*:*:*:*", matchCriteriaId: "B34C3204-4A63-4490-ABED-AF83CE3F37E0", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.11.0:*:*:*:*:*:*:*", matchCriteriaId: "39EAE85E-BF52-45EA-82D8-BBBC0DE9759C", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.11.1:*:*:*:*:*:*:*", matchCriteriaId: "4B4D1998-D62F-4D0E-8E6C-33D4760BE69D", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.11.2:*:*:*:*:*:*:*", matchCriteriaId: "13CD2D8F-32F6-4AC4-B43C-506724EA6E38", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.11.3:*:*:*:*:*:*:*", matchCriteriaId: "4733C600-C5D6-4A5D-A1DF-1F41597F6926", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.11.4:*:*:*:*:*:*:*", matchCriteriaId: "BC7EBD3A-EDFC-4B8F-9095-5E0670AF991E", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.11.5:*:*:*:*:*:*:*", matchCriteriaId: "55EC512F-3F86-40DA-AA7B-034DA9B5DBA3", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.11.80:*:*:*:*:*:*:*", matchCriteriaId: "08FF236F-A7D5-4D08-8885-BD1889B0D398", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.11.90:*:*:*:*:*:*:*", matchCriteriaId: "5F5EDED4-34A3-4D2B-A9E7-D980D78E10EA", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.11.95:*:*:*:*:*:*:*", matchCriteriaId: "46457BB9-BD24-4437-AFDA-01D25E52410E", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.11.97:*:*:*:*:*:*:*", matchCriteriaId: "52A2D11C-26D2-47F1-9D34-60DB3116C39E", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.12.0:*:*:*:*:*:*:*", matchCriteriaId: "A58204C3-0DEC-462B-A6B8-5EC1D9B65729", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.12.1:*:*:*:*:*:*:*", matchCriteriaId: "C767A89D-BA45-4730-BA2D-AAC2BA7436E0", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.12.2:*:*:*:*:*:*:*", matchCriteriaId: "9A5FC4CC-DC0C-44D8-AAF6-A15CF7E6BD5C", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.12.3:*:*:*:*:*:*:*", matchCriteriaId: "24629660-4066-4362-AD77-080604488303", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.12.4:*:*:*:*:*:*:*", matchCriteriaId: "718095EE-ADEC-4E28-B678-DA3D636BBE32", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.12.5:*:*:*:*:*:*:*", matchCriteriaId: "EA3E3729-298F-43C3-9BE0-82072FE47F9B", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.12.80:*:*:*:*:*:*:*", matchCriteriaId: "B6FC3277-8410-437F-813A-63254E983A5F", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.12.90:*:*:*:*:*:*:*", matchCriteriaId: "88E2B874-46DF-4A95-9541-14CF70E2A73D", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.12.95:*:*:*:*:*:*:*", matchCriteriaId: "1A593BA6-D3B2-48EE-AC9E-B84967D03B37", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.12.97:*:*:*:*:*:*:*", matchCriteriaId: "14034B30-9DE0-43EE-A79D-D4FC624D6C86", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.13.0:*:*:*:*:*:*:*", matchCriteriaId: "2A34BC1E-102D-43EF-A7BD-46E9866B07ED", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.13.1:*:*:*:*:*:*:*", matchCriteriaId: "90E66075-D997-4C6D-94AA-DE224B12BB2D", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.13.2:*:*:*:*:*:*:*", matchCriteriaId: "33DCF182-2AD8-4267-B425-1B0A7D2BC0EC", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.13.3:*:*:*:*:*:*:*", matchCriteriaId: "F572E904-3EE4-4B01-AA7B-EF5F7F643E37", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.13.80:*:*:*:*:*:*:*", matchCriteriaId: "033ED945-4E0E-41AA-8B02-3BDCC0F27159", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.13.90:*:*:*:*:*:*:*", matchCriteriaId: "C46B58D8-67F7-4920-8512-CB07C7446976", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdelibs:4.13.95:*:*:*:*:*:*:*", matchCriteriaId: "E58C522E-8824-49B7-AAA9-6545E6DD5551", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and \"PID reuse race conditions.\"", }, { lang: "es", value: "KDE kdelibs anterior a 4.14 y kauth anterior a 5.1 no utilizan debidamente D-Bus para la comunicación con una autoridad polkit, lo que permite a usuarios locales evadir las restricciones de acceso mediante el aprovechamiento de una condición de carrera PolkitUnixProcess PolkitSubject a través de un proceso (1) setuid o (2) pkexec, relacionado con el CVE-2013-4288 y 'condiciones de carrera de reuso PID.'", }, ], id: "CVE-2014-5033", lastModified: "2024-11-21T02:11:19.663", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-08-19T18:55:03.233", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html", }, { source: "cve@mitre.org", url: "http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", ], url: "http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2014-1359.html", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/60385", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/60633", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/60654", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2014/dsa-3004", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.kde.org/info/security/advisory-20140730-1.txt", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/USN-2304-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", ], url: "http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1359.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60385", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60633", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60654", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2014/dsa-3004", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.kde.org/info/security/advisory-20140730-1.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-2304-1", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-362", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2014-5033
Vulnerability from cvelistv5
Published
2014-08-19 18:00
Modified
2024-08-06 11:34
Severity ?
EPSS score ?
Summary
KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and "PID reuse race conditions."
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/60385 | third-party-advisory, x_refsource_SECUNIA | |
http://rhn.redhat.com/errata/RHSA-2014-1359.html | vendor-advisory, x_refsource_REDHAT | |
http://www.debian.org/security/2014/dsa-3004 | vendor-advisory, x_refsource_DEBIAN | |
http://www.ubuntu.com/usn/USN-2304-1 | vendor-advisory, x_refsource_UBUNTU | |
http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a | x_refsource_CONFIRM | |
http://www.kde.org/info/security/advisory-20140730-1.txt | x_refsource_CONFIRM | |
http://secunia.com/advisories/60654 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html | vendor-advisory, x_refsource_SUSE | |
http://secunia.com/advisories/60633 | third-party-advisory, x_refsource_SECUNIA | |
http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T11:34:37.288Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "60385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60385", }, { name: "RHSA-2014:1359", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1359.html", }, { name: "DSA-3004", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3004", }, { name: "USN-2304-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2304-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kde.org/info/security/advisory-20140730-1.txt", }, { name: "60654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60654", }, { name: "openSUSE-SU-2014:0981", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html", }, { name: "60633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60633", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-07-30T00:00:00", descriptions: [ { lang: "en", value: "KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and \"PID reuse race conditions.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2014-10-14T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "60385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60385", }, { name: "RHSA-2014:1359", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1359.html", }, { name: "DSA-3004", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3004", }, { name: "USN-2304-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2304-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kde.org/info/security/advisory-20140730-1.txt", }, { name: "60654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60654", }, { name: "openSUSE-SU-2014:0981", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html", }, { name: "60633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60633", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-5033", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and \"PID reuse race conditions.\"", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "60385", refsource: "SECUNIA", url: "http://secunia.com/advisories/60385", }, { name: "RHSA-2014:1359", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1359.html", }, { name: "DSA-3004", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-3004", }, { name: "USN-2304-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2304-1", }, { name: "http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a", refsource: "CONFIRM", url: "http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a", }, { name: "http://www.kde.org/info/security/advisory-20140730-1.txt", refsource: "CONFIRM", url: "http://www.kde.org/info/security/advisory-20140730-1.txt", }, { name: "60654", refsource: "SECUNIA", url: "http://secunia.com/advisories/60654", }, { name: "openSUSE-SU-2014:0981", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html", }, { name: "60633", refsource: "SECUNIA", url: "http://secunia.com/advisories/60633", }, { name: "http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23", refsource: "CONFIRM", url: "http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-5033", datePublished: "2014-08-19T18:00:00", dateReserved: "2014-07-22T00:00:00", dateUpdated: "2024-08-06T11:34:37.288Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }