Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-7817

Опубликовано: 24 нояб. 2014
Источник: debian
EPSS Низкий

Описание

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.19-14package
eglibcremovedpackage
eglibcno-dsawheezypackage

Примечания

  • https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html

  • Git commit: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c

EPSS

Процентиль: 38%
0.00165
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

redhat
почти 11 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

nvd
почти 11 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

github
больше 3 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

oracle-oval
больше 10 лет назад

ELSA-2014-2023: glibc security and bug fix update (MODERATE)

EPSS

Процентиль: 38%
0.00165
Низкий