CVE-2014-7817

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

13 Feb 2023, 00:42

Type Values Removed Values Added
References
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1157689', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1157689', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:0016', 'name': 'https://access.redhat.com/errata/RHSA-2015:0016', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2014-7817', 'name': 'https://access.redhat.com/security/cve/CVE-2014-7817', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:2023', 'name': 'https://access.redhat.com/errata/RHSA-2014:2023', 'tags': [], 'refsource': 'MISC'}
Summary It was found that the wordexp() function would perform command substitution even when the WRDE_NOCMD flag was specified. An attacker able to provide specially crafted input to an application using the wordexp() function, and not sanitizing the input correctly, could potentially use this flaw to execute arbitrary commands with the credentials of the user running that application. The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

02 Feb 2023, 20:18

Type Values Removed Values Added
Summary The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))". It was found that the wordexp() function would perform command substitution even when the WRDE_NOCMD flag was specified. An attacker able to provide specially crafted input to an application using the wordexp() function, and not sanitizing the input correctly, could potentially use this flaw to execute arbitrary commands with the credentials of the user running that application.
References
  • {'url': 'https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c', 'name': 'https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c', 'tags': [], 'refsource': 'CONFIRM'}
  • (MISC) https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c -
  • (MISC) https://access.redhat.com/security/cve/CVE-2014-7817 -
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1157689 -
  • (MISC) https://access.redhat.com/errata/RHSA-2014:2023 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:0016 -

Information

Published : 2014-11-24 15:59

Updated : 2023-12-10 11:31


NVD link : CVE-2014-7817

Mitre link : CVE-2014-7817

CVE.ORG link : CVE-2014-7817


JSON object : View

Products Affected

opensuse

  • opensuse

canonical

  • ubuntu_linux

debian

  • debian_linux

gnu

  • glibc
CWE
CWE-20

Improper Input Validation