Lucene search

K
gentooGentoo FoundationGLSA-201403-07
HistoryMar 26, 2014 - 12:00 a.m.

grep: User-assisted execution of arbitrary code

2014-03-2600:00:00
Gentoo Foundation
security.gentoo.org
18

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.007

Percentile

80.0%

Background

grep is the GNU regular expression matcher.

Description

An integer overflow flaw has been discovered in grep.

Impact

An attacker could entice a user to run grep on a specially crafted file, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All grep users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/grep-2.12"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-apps/grep< 2.12UNKNOWN

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.007

Percentile

80.0%