Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:2CAD2503E6F8FEFB9D3E259027678487
HistorySep 19, 2014 - 12:00 a.m.

CVE-2014-5119 glib_gconv_translit_find() exploit | Cloud Foundry

2014-09-1900:00:00
Cloud Foundry
www.cloudfoundry.org
21

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.012 Low

EPSS

Percentile

84.7%

CVE-2014-5119 glib_gconv_translit_find() exploit

Important

Vendor

Canonical Ubuntu

Versions Affected

  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Description

Certain applications could be made to crash or run programs as an administrator.

Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.

Affected Products and Versions

_Severity is important unless otherwise noted.
_

  • Cloud Foundry Runtime Deployments prior to v183 with BOSH Ubuntu stemcells prior to 2710

Mitigation

Users of affected versions should apply the following mitigation:

  • The Cloud Foundry Project recommends that Cloud Foundry Runtime Deployments running Release v182 or earlier upgrade to v183 or later and BOSH Ubuntu stemcell 2710 or later, which resolves this vulnerability.

Credit

This issue was discovered by Tavis Ormandy and John Haxby.

References

History

2014-Sep-19: Initial vulnerability report published.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.012 Low

EPSS

Percentile

84.7%