CVE-2014-1934:
eyeD3 is vulnerable to arbitrary file modification via symlink attack
4.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.14704%
CWE
Published
5/14/2022
Updated
8/4/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
eyeD3 | pip | < 0.7.5 | 0.7.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two instances in tag.py
where tempfile.mktemp()
was used to generate temporary filenames. This function is inherently unsafe due to time-of-check-to-time-of-use (TOCTOU) race conditions, allowing symlink attacks. The Debian patch (CVE-2014-1934.patch
) explicitly replaces mktemp()
with tempfile.NamedTemporaryFile()
, confirming the vulnerable code location. Multiple sources (Debian
, Red Hat
, OpenSUSE
advisories) reference this fix in tag.py
, and the CWE-59 classification directly maps to improper symlink resolution. Though the exact function names aren't provided in the snippets, the context indicates the vulnerability occurs in the Tag
class's file-saving logic where temporary files are created.