Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-5119 | First vendor Publication | 2014-08-29 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:26388 | |||
Oval ID: | oval:org.mitre.oval:def:26388 | ||
Title: | RHSA-2014:1110: glibc security update (Important) | ||
Description: | The glibc packages contain the standard C libraries used by multiple programs on the system. These packages contain the standard C and the standard math libraries. Without these two libraries, a Linux system cannot function properly. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1110-00 CESA-2014:1110 CVE-2014-0475 CVE-2014-5119 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 CentOS Linux 5 CentOS Linux 6 CentOS Linux 7 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26688 | |||
Oval ID: | oval:org.mitre.oval:def:26688 | ||
Title: | DSA-3012-1 eglibc - security update | ||
Description: | Tavis Ormandy discovered a heap-based buffer overflow in the transliteration module loading code in eglibc, Debian's version of the GNU C Library. As a result, an attacker who can supply a crafted destination character set argument to iconv-related character conversation functions could achieve arbitrary code execution. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3012-1 CVE-2014-5119 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | eglibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26789 | |||
Oval ID: | oval:org.mitre.oval:def:26789 | ||
Title: | SUSE-SU-2014:1125-1 -- Security update for glibc | ||
Description: | This glibc update fixes a critical privilege escalation problem and two non-security issues: * bnc#892073: An off-by-one error leading to a heap-based buffer overflow was found in __gconv_translit_find(). An exploit that targets the problem is publicly available. (CVE-2014-5119) * bnc#892065: setenv-alloca.patch: Avoid unbound alloca in setenv. * bnc#888347: printf-multibyte-format.patch: Don't parse %s format argument as multi-byte string. Security Issues: * CVE-2014-5119 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1125-1 CVE-2014-5119 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27192 | |||
Oval ID: | oval:org.mitre.oval:def:27192 | ||
Title: | ELSA-2014-1110 -- glibc security update (important) | ||
Description: | An off-by-one heap-based buffer overflow flaw was found in glibc's internal __gconv_translit_find() function. An attacker able to make an application call the iconv_open() function with a specially crafted argument could possibly use this flaw to execute arbitrary code with the privileges of that application. (CVE-2014-5119) A directory traveral flaw was found in the way glibc loaded locale files. An attacker able to make an application use a specially crafted locale name value (for example, specified in an LC_* environment variable) could possibly use this flaw to execute arbitrary code with the privileges of that application. (CVE-2014-0475) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1110 CVE-2014-0475 CVE-2014-5119 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | glibc |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-08-27 | glibc Off-by-One NUL Byte gconv_translit_find Exploit |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-01-22 | IAVM : 2015-B-0007 - Multiple Vulnerabilities in Juniper Secure Analytics (JSA) and Security Threa... Severity : Category I - VMSKEY : V0058213 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-02-18 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201602-02.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1129-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1128-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1122-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1119-1.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-168.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-43.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0024.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0023.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2014-0017.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2014-0033.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1118.nasl - Type : ACT_GATHER_INFO |
2014-10-20 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9830.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-399.nasl - Type : ACT_GATHER_INFO |
2014-09-12 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-536.nasl - Type : ACT_GATHER_INFO |
2014-09-12 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-175.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1110.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1110.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1110.nasl - Type : ACT_GATHER_INFO |
2014-08-29 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2328-1.nasl - Type : ACT_GATHER_INFO |
2014-08-29 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9824.nasl - Type : ACT_GATHER_INFO |
2014-08-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3012.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:41:58 |
|
2023-02-13 05:28:19 |
|
2023-02-02 21:28:32 |
|
2021-05-04 12:33:08 |
|
2021-04-22 01:40:37 |
|
2020-12-11 01:11:39 |
|
2020-05-24 01:14:13 |
|
2020-05-23 01:52:43 |
|
2020-05-23 00:41:44 |
|
2017-01-07 09:25:41 |
|
2016-06-03 09:25:14 |
|
2016-05-03 13:30:31 |
|
2016-04-29 13:31:42 |
|
2016-04-26 13:27:45 |
|
2016-02-27 13:27:00 |
|
2016-02-19 13:26:19 |
|
2015-12-05 13:26:39 |
|
2015-10-18 17:22:47 |
|
2015-05-21 13:31:29 |
|
2015-03-31 13:28:42 |
|
2015-03-27 13:28:28 |
|
2015-03-11 13:24:55 |
|
2015-02-06 09:22:52 |
|
2015-02-03 13:24:13 |
|
2014-11-27 13:28:34 |
|
2014-11-14 13:28:38 |
|
2014-11-08 13:31:54 |
|
2014-10-28 13:26:24 |
|
2014-10-25 13:25:29 |
|
2014-10-21 13:26:03 |
|
2014-10-12 13:27:26 |
|
2014-10-04 13:31:39 |
|
2014-09-28 13:27:27 |
|
2014-09-14 13:26:42 |
|
2014-09-13 13:43:08 |
|
2014-09-02 21:24:00 |
|
2014-08-31 13:25:13 |
|
2014-08-30 13:25:33 |
|
2014-08-29 21:23:26 |
|