Computer Security
[EN] securityvulns.ru no-pyccku


GNU glibc code execution
Published:30.11.2014
Source:
SecurityVulns ID:14108
Type:library
Threat Level:
6/10
Description:wordexp() function code execution.
Affected:GNU : glibc 2.21
CVE:CVE-2014-7817 (The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".)
Original documentdocumentMANDRIVA, [ MDVSA-2014:232 ] glibc (30.11.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod