Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-7817

Опубликовано: 24 нояб. 2014
Источник: debian

Описание

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.19-14package
eglibcremovedpackage
eglibcno-dsawheezypackage

Примечания

  • https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html

  • Git commit: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c

Связанные уязвимости

ubuntu
около 11 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

redhat
около 11 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

nvd
около 11 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

github
больше 3 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

oracle-oval
около 11 лет назад

ELSA-2014-2023: glibc security and bug fix update (MODERATE)