Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-7817

Опубликовано: 24 нояб. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 4.6

Описание

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((...))".

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

2.19-0ubuntu6.4
lucid

released

2.11.1-0ubuntu7.19
precise

released

2.15-0ubuntu10.9
trusty

released

2.19-0ubuntu6.4
trusty/esm

not-affected

2.19-0ubuntu6.4
upstream

needs-triage

utopic

DNE

Показывать по

РелизСтатусПримечание
devel

released

2.19-13ubuntu3
esm-infra-legacy/trusty

DNE

lucid

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

utopic

released

2.19-10ubuntu2.1

Показывать по

4.6 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

nvd
почти 11 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

debian
почти 11 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforc ...

github
больше 3 лет назад

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

oracle-oval
больше 10 лет назад

ELSA-2014-2023: glibc security and bug fix update (MODERATE)

4.6 Medium

CVSS2