Описание
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((...))".
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | released | 2.19-0ubuntu6.4 |
| lucid | released | 2.11.1-0ubuntu7.19 |
| precise | released | 2.15-0ubuntu10.9 |
| trusty | released | 2.19-0ubuntu6.4 |
| trusty/esm | released | 2.19-0ubuntu6.4 |
| upstream | needs-triage | |
| utopic | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 2.19-13ubuntu3 |
| esm-infra-legacy/trusty | DNE | |
| lucid | DNE | |
| precise | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | needs-triage | |
| utopic | released | 2.19-10ubuntu2.1 |
Показывать по
EPSS
4.6 Medium
CVSS2
Связанные уязвимости
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforc ...
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
ELSA-2014-2023: glibc security and bug fix update (MODERATE)
EPSS
4.6 Medium
CVSS2