Описание
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((...
))".
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | not-affected | 2.19-0ubuntu6.4 |
lucid | released | 2.11.1-0ubuntu7.19 |
precise | released | 2.15-0ubuntu10.9 |
trusty | released | 2.19-0ubuntu6.4 |
trusty/esm | not-affected | 2.19-0ubuntu6.4 |
upstream | needs-triage | |
utopic | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 2.19-13ubuntu3 |
esm-infra-legacy/trusty | DNE | |
lucid | DNE | |
precise | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needs-triage | |
utopic | released | 2.19-10ubuntu2.1 |
Показывать по
4.6 Medium
CVSS2
Связанные уязвимости
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforc ...
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
ELSA-2014-2023: glibc security and bug fix update (MODERATE)
4.6 Medium
CVSS2