Executive Summary
Summary | |
---|---|
Title | GNU C Library vulnerability |
Informations | |||
---|---|---|---|
Name | USN-2328-1 | First vendor Publication | 2014-08-29 |
Vendor | Ubuntu | Last vendor Modification | 2014-08-29 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Certain applications could be made to crash or run programs as an administrator. Software Description: - eglibc: GNU C Library Details: Tavis Ormandy and John Haxby discovered that the GNU C Library contained an off-by-one error when performing transliteration module loading. A local attacker could exploit this to gain administrative privileges. (CVE-2014-5119) USN-2306-1 fixed vulnerabilities in the GNU C Library. On Ubuntu 10.04 LTS and Ubuntu 12.04 LTS the security update for CVE-2014-0475 caused a regression with localplt on PowerPC. This update fixes the problem. We apologize for the inconvenience. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: Ubuntu 12.04 LTS: Ubuntu 10.04 LTS: After a standard system update you need to reboot your computer to make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-2328-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
50 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:24848 | |||
Oval ID: | oval:org.mitre.oval:def:24848 | ||
Title: | DSA-2976-1 -- eglibc - security update | ||
Description: | Stephane Chazelas discovered that the GNU C library, glibc, processed ".." path segments in locale-related environment variables, possibly allowing attackers to circumvent intended restrictions, such as ForceCommand in OpenSSH, assuming that they can supply crafted locale settings. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2976-1 CVE-2014-0475 | Version: | 5 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | eglibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25837 | |||
Oval ID: | oval:org.mitre.oval:def:25837 | ||
Title: | USN-2328-1 -- eglibc vulnerability | ||
Description: | Certain applications could be made to crash or run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2328-1 CVE-2014-5119 CVE-2014-0475 | Version: | 3 |
Platform(s): | Ubuntu 14.04 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | eglibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26388 | |||
Oval ID: | oval:org.mitre.oval:def:26388 | ||
Title: | RHSA-2014:1110: glibc security update (Important) | ||
Description: | The glibc packages contain the standard C libraries used by multiple programs on the system. These packages contain the standard C and the standard math libraries. Without these two libraries, a Linux system cannot function properly. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1110-00 CESA-2014:1110 CVE-2014-0475 CVE-2014-5119 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 CentOS Linux 5 CentOS Linux 6 CentOS Linux 7 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26688 | |||
Oval ID: | oval:org.mitre.oval:def:26688 | ||
Title: | DSA-3012-1 eglibc - security update | ||
Description: | Tavis Ormandy discovered a heap-based buffer overflow in the transliteration module loading code in eglibc, Debian's version of the GNU C Library. As a result, an attacker who can supply a crafted destination character set argument to iconv-related character conversation functions could achieve arbitrary code execution. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3012-1 CVE-2014-5119 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | eglibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26789 | |||
Oval ID: | oval:org.mitre.oval:def:26789 | ||
Title: | SUSE-SU-2014:1125-1 -- Security update for glibc | ||
Description: | This glibc update fixes a critical privilege escalation problem and two non-security issues: * bnc#892073: An off-by-one error leading to a heap-based buffer overflow was found in __gconv_translit_find(). An exploit that targets the problem is publicly available. (CVE-2014-5119) * bnc#892065: setenv-alloca.patch: Avoid unbound alloca in setenv. * bnc#888347: printf-multibyte-format.patch: Don't parse %s format argument as multi-byte string. Security Issues: * CVE-2014-5119 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1125-1 CVE-2014-5119 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26792 | |||
Oval ID: | oval:org.mitre.oval:def:26792 | ||
Title: | SUSE-SU-2014:1027-1 -- Security update for glibc | ||
Description: | This glibc update contains one security and two non security fixes. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1027-1 CVE-2014-0475 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26797 | |||
Oval ID: | oval:org.mitre.oval:def:26797 | ||
Title: | SUSE-SU-2014:1213-1 -- Security update for bash | ||
Description: | ash has been updated to fix a critical security issue. In some circumstances, the shell would evaluate shellcode in environment variables passed at startup time. This allowed code execution by local or remote attackers who could pass environment variables to bash scripts. (CVE-2014-6271) Security Issues: * CVE-2014-6271 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1213-1 CVE-2014-6271 CVE-2014-0475 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Server 10 SUSE Linux Enterprise Desktop 11 | Product(s): | bash |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26821 | |||
Oval ID: | oval:org.mitre.oval:def:26821 | ||
Title: | SUSE-SU-2014:1214-1 -- Security update for bash | ||
Description: | ash has been updated to fix a critical security issue. In some circumstances, the shell would evaluate shellcode in environment variables passed at startup time. This allowed code execution by local or remote attackers who could pass environment variables to bash scripts. (CVE-2014-6271) Additionally, the following bugs have been fixed: * Avoid possible buffer overflow when expanding the /dev/fd prefix with e.g. the test built-in. (CVE-2012-3410) * Enable workaround for changed behavior of sshd. (bnc#688469) Security Issues: * CVE-2014-6271 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271> * CVE-2012-3410 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3410> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1214-1 CVE-2014-6271 CVE-2012-3410 CVE-2014-0475 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 10 | Product(s): | bash |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26978 | |||
Oval ID: | oval:org.mitre.oval:def:26978 | ||
Title: | DEPRECATED: SUSE-SU-2014:1027-1 -- Security update for glibc | ||
Description: | This glibc update contains one security and two non security fixes. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1027-1 CVE-2014-0475 | Version: | 4 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27192 | |||
Oval ID: | oval:org.mitre.oval:def:27192 | ||
Title: | ELSA-2014-1110 -- glibc security update (important) | ||
Description: | An off-by-one heap-based buffer overflow flaw was found in glibc's internal __gconv_translit_find() function. An attacker able to make an application call the iconv_open() function with a specially crafted argument could possibly use this flaw to execute arbitrary code with the privileges of that application. (CVE-2014-5119) A directory traveral flaw was found in the way glibc loaded locale files. An attacker able to make an application use a specially crafted locale name value (for example, specified in an LC_* environment variable) could possibly use this flaw to execute arbitrary code with the privileges of that application. (CVE-2014-0475) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1110 CVE-2014-0475 CVE-2014-5119 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | glibc |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-08-27 | glibc Off-by-One NUL Byte gconv_translit_find Exploit |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-01-22 | IAVM : 2015-B-0007 - Multiple Vulnerabilities in Juniper Secure Analytics (JSA) and Security Threa... Severity : Category I - VMSKEY : V0058213 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-02-18 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201602-02.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0551-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0550-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1129-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1128-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1122-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1119-1.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-168.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-43.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0024.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0023.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2014-0033.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2014-0017.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1118.nasl - Type : ACT_GATHER_INFO |
2014-10-20 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9830.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-400.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-399.nasl - Type : ACT_GATHER_INFO |
2014-09-12 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-536.nasl - Type : ACT_GATHER_INFO |
2014-09-12 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-175.nasl - Type : ACT_GATHER_INFO |
2014-09-09 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2306-3.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1110.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1110.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1110.nasl - Type : ACT_GATHER_INFO |
2014-08-29 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2328-1.nasl - Type : ACT_GATHER_INFO |
2014-08-29 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9824.nasl - Type : ACT_GATHER_INFO |
2014-08-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3012.nasl - Type : ACT_GATHER_INFO |
2014-08-07 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-152.nasl - Type : ACT_GATHER_INFO |
2014-08-06 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2306-2.nasl - Type : ACT_GATHER_INFO |
2014-08-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2306-1.nasl - Type : ACT_GATHER_INFO |
2014-07-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2976.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-09-02 21:27:11 |
|
2014-08-30 13:25:34 |
|
2014-08-29 21:26:30 |
|
2014-08-29 05:26:09 |
|