CVE-2014-5119
Publication date 26 August 2014
Last updated 24 July 2024
Ubuntu priority
Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
Status
Package | Ubuntu Release | Status |
---|---|---|
eglibc | 14.04 LTS trusty |
Fixed 2.19-0ubuntu6.3
|
glibc | 14.04 LTS trusty | Not in release |
Notes
jdstrand
per researcher (Chris Evans), a path with an even number of characters to the gconv/ directory makes his exploit harmless. This happens to be true on Ubuntu with multiarch on 12.04 LTS and higher on amd64 and i386. Ubuntu 10.04 LTS and armhf on all supported releases has an odd path length. There are likely other ways to exploit on Ubuntu. eglibc on 14.10 exists but is scheduled to be removed the severity was bumped from medium to high once additional research was revealed on 2014-08-26 (marked PublicDateAtUSN accordingly). There are no known active exploits against Ubuntu as of 2014-08-28, but they will likely be available soon.
Patch details
Package | Patch details |
---|---|
glibc |
References
Related Ubuntu Security Notices (USN)
- USN-2328-1
- GNU C Library vulnerability
- 29 August 2014
Other references
- http://seclists.org/oss-sec/2014/q3/145
- http://www.openwall.com/lists/oss-security/2014/07/14/2
- http://www.openwall.com/lists/oss-security/2014/08/13/5
- http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html
- http://www.openwall.com/lists/oss-security/2014/08/26/2
- https://www.cve.org/CVERecord?id=CVE-2014-5119