Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2014:175 | First vendor Publication | 2014-09-05 |
Vendor | Mandriva | Last vendor Modification | 2014-09-05 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities has been found and corrected in glibc: When converting IBM930 code with iconv(), if IBM930 code which includes invalid multibyte character 0xffff is specified, then iconv() segfaults (CVE-2012-6656). Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules (CVE-2014-5119). Crashes were reported in the IBM code page decoding functions (IBM933, IBM935, IBM937, IBM939, IBM1364) (CVE-2014-6040). The updated packages have been patched to correct these issues. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2014:175 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
33 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
33 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:25924 | |||
Oval ID: | oval:org.mitre.oval:def:25924 | ||
Title: | SUSE-SU-2014:1129-1 -- Security update for glibc | ||
Description: | This glibc update fixes a critical privilege escalation problem and two additional issues: * bnc#892073: An off-by-one error leading to a heap-based buffer overflow was found in __gconv_translit_find(). An exploit that targets the problem is publicly available. (CVE-2014-5119) * bnc#836746: Avoid race between {, __de}allocate_stack and __reclaim_stacks during fork. * bnc#844309: Fixed various overflows, reading large /etc/hosts or long names. (CVE-2013-4357) * bnc#894553, bnc#894556: Fixed various crashes on invalid input in IBM gconv modules. (CVE-2014-6040, CVE-2012-6656) Security Issues: * CVE-2012-6656 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656> * CVE-2013-4357 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4357> * CVE-2014-5119 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119> * CVE-2014-6040 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1129-1 CVE-2014-5119 CVE-2013-4357 CVE-2014-6040 CVE-2012-6656 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26388 | |||
Oval ID: | oval:org.mitre.oval:def:26388 | ||
Title: | RHSA-2014:1110: glibc security update (Important) | ||
Description: | The glibc packages contain the standard C libraries used by multiple programs on the system. These packages contain the standard C and the standard math libraries. Without these two libraries, a Linux system cannot function properly. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1110-00 CESA-2014:1110 CVE-2014-0475 CVE-2014-5119 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 CentOS Linux 5 CentOS Linux 6 CentOS Linux 7 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26688 | |||
Oval ID: | oval:org.mitre.oval:def:26688 | ||
Title: | DSA-3012-1 eglibc - security update | ||
Description: | Tavis Ormandy discovered a heap-based buffer overflow in the transliteration module loading code in eglibc, Debian's version of the GNU C Library. As a result, an attacker who can supply a crafted destination character set argument to iconv-related character conversation functions could achieve arbitrary code execution. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3012-1 CVE-2014-5119 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | eglibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26789 | |||
Oval ID: | oval:org.mitre.oval:def:26789 | ||
Title: | SUSE-SU-2014:1125-1 -- Security update for glibc | ||
Description: | This glibc update fixes a critical privilege escalation problem and two non-security issues: * bnc#892073: An off-by-one error leading to a heap-based buffer overflow was found in __gconv_translit_find(). An exploit that targets the problem is publicly available. (CVE-2014-5119) * bnc#892065: setenv-alloca.patch: Avoid unbound alloca in setenv. * bnc#888347: printf-multibyte-format.patch: Don't parse %s format argument as multi-byte string. Security Issues: * CVE-2014-5119 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1125-1 CVE-2014-5119 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26817 | |||
Oval ID: | oval:org.mitre.oval:def:26817 | ||
Title: | SUSE-SU-2014:1128-1 -- Security update for glibc | ||
Description: | This glibc update fixes a critical privilege escalation problem and the following security and non-security issues: * bnc#892073: An off-by-one error leading to a heap-based buffer overflow was found in __gconv_translit_find(). An exploit that targets the problem is publicly available. (CVE-2014-5119) * bnc#882600: Copy filename argument in posix_spawn_file_actions_addopen. (CVE-2014-4043) * bnc#860501: Use O_LARGEFILE for utmp file. * bnc#842291: Fix typo in glibc-2.5-dlopen-lookup-race.diff. * bnc#839870: Fix integer overflows in malloc. (CVE-2013-4332) * bnc#834594: Fix readdir_r with long file names. (CVE-2013-4237) * bnc#824639: Drop lock before calling malloc_printerr. * bnc#801246: Fix buffer overrun in regexp matcher. (CVE-2013-0242) * bnc#779320: Fix buffer overflow in strcoll. (CVE-2012-4412) * bnc#894556 / bnc#894553: Fix crashes on invalid input in IBM gconv modules. (CVE-2014-6040, CVE-2012-6656, bnc#894553, bnc#894556, BZ#17325, BZ#14134) Security Issues: * CVE-2014-5119 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119> * CVE-2014-4043 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043> * CVE-2013-4332 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332> * CVE-2013-4237 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237> * CVE-2013-0242 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242> * CVE-2012-4412 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1128-1 CVE-2014-5119 CVE-2014-4043 CVE-2013-4332 CVE-2013-4237 CVE-2013-0242 CVE-2012-4412 CVE-2014-6040 CVE-2012-6656 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 10 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27192 | |||
Oval ID: | oval:org.mitre.oval:def:27192 | ||
Title: | ELSA-2014-1110 -- glibc security update (important) | ||
Description: | An off-by-one heap-based buffer overflow flaw was found in glibc's internal __gconv_translit_find() function. An attacker able to make an application call the iconv_open() function with a specially crafted argument could possibly use this flaw to execute arbitrary code with the privileges of that application. (CVE-2014-5119) A directory traveral flaw was found in the way glibc loaded locale files. An attacker able to make an application use a specially crafted locale name value (for example, specified in an LC_* environment variable) could possibly use this flaw to execute arbitrary code with the privileges of that application. (CVE-2014-0475) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1110 CVE-2014-0475 CVE-2014-5119 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | glibc |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-08-27 | glibc Off-by-One NUL Byte gconv_translit_find Exploit |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-01-22 | IAVM : 2015-B-0007 - Multiple Vulnerabilities in Juniper Secure Analytics (JSA) and Security Threa... Severity : Category I - VMSKEY : V0058213 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-02-18 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201602-02.nasl - Type : ACT_GATHER_INFO |
2016-02-17 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2016-0013.nasl - Type : ACT_GATHER_INFO |
2015-09-17 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL16435.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0170-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0167-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0164-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1129-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1128-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1122-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1119-1.nasl - Type : ACT_GATHER_INFO |
2015-04-02 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL16342.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-168.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150305_glibc_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-97.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-43.nasl - Type : ACT_GATHER_INFO |
2015-03-25 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2015-495.nasl - Type : ACT_GATHER_INFO |
2015-03-18 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-0327.nasl - Type : ACT_GATHER_INFO |
2015-03-10 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0327.nasl - Type : ACT_GATHER_INFO |
2015-03-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201503-04.nasl - Type : ACT_GATHER_INFO |
2015-03-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0327.nasl - Type : ACT_GATHER_INFO |
2015-03-05 | Name : The remote Fedora host is missing a security update. File : fedora_2015-2845.nasl - Type : ACT_GATHER_INFO |
2015-02-11 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_glibc-150129.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0024.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0023.nasl - Type : ACT_GATHER_INFO |
2015-01-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3142.nasl - Type : ACT_GATHER_INFO |
2015-01-09 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0003.nasl - Type : ACT_GATHER_INFO |
2015-01-09 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2015-468.nasl - Type : ACT_GATHER_INFO |
2015-01-08 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150107_glibc_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2015-01-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0016.nasl - Type : ACT_GATHER_INFO |
2015-01-08 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0016.nasl - Type : ACT_GATHER_INFO |
2015-01-08 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-0016.nasl - Type : ACT_GATHER_INFO |
2014-12-04 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2432-1.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2014-0017.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2014-0033.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1118.nasl - Type : ACT_GATHER_INFO |
2014-10-24 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-296-01.nasl - Type : ACT_GATHER_INFO |
2014-10-20 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9830.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-399.nasl - Type : ACT_GATHER_INFO |
2014-09-12 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-536.nasl - Type : ACT_GATHER_INFO |
2014-09-12 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-175.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1110.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1110.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1110.nasl - Type : ACT_GATHER_INFO |
2014-08-29 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2328-1.nasl - Type : ACT_GATHER_INFO |
2014-08-29 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9824.nasl - Type : ACT_GATHER_INFO |
2014-08-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3012.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-12-05 21:30:29 |
|
2014-09-13 13:43:12 |
|
2014-09-05 13:22:12 |
|