Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.1.2.2014.43
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-43-1)
Summary:The remote host is missing an update for the Debian 'eglibc' package(s) announced via the DLA-43-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'eglibc' package(s) announced via the DLA-43-1 advisory.

Vulnerability Insight:
CVE-2014-0475

Stephane Chazelas discovered that the GNU C library, glibc, processed '..' path segments in locale-related environment variables, possibly allowing attackers to circumvent intended restrictions, such as ForceCommand in OpenSSH, assuming that they can supply crafted locale settings.

CVE-2014-5119

Tavis Ormandy discovered a heap-based buffer overflow in the transliteration module loading code in eglibc, Debian's version of the GNU C Library. As a result, an attacker who can supply a crafted destination character set argument to iconv-related character conversation functions could achieve arbitrary code execution.

This update removes support of loadable gconv transliteration modules. Besides the security vulnerability, the module loading code had functionality defects which prevented it from working for the intended purpose.

For Debian 6 Squeeze, these issues have been fixed in eglibc version 2.11.3-4+deb6u1

Affected Software/OS:
'eglibc' package(s) on Debian 6.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-0475
BugTraq ID: 68505
http://www.securityfocus.com/bid/68505
Debian Security Information: DSA-2976 (Google Search)
http://www.debian.org/security/2014/dsa-2976
https://security.gentoo.org/glsa/201602-02
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/07/10/7
http://www.openwall.com/lists/oss-security/2014/07/14/6
RedHat Security Advisories: RHSA-2014:1110
https://rhn.redhat.com/errata/RHSA-2014-1110.html
http://www.securitytracker.com/id/1030569
Common Vulnerability Exposure (CVE) ID: CVE-2014-5119
20140826 CVE-2014-5119 glibc __gconv_translit_find() exploit
http://seclists.org/fulldisclosure/2014/Aug/69
20140910 Cisco Unified Communications Manager glibc Arbitrary Code Execution Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-5119
60345
http://secunia.com/advisories/60345
60358
http://secunia.com/advisories/60358
60441
http://secunia.com/advisories/60441
61074
http://secunia.com/advisories/61074
61093
http://secunia.com/advisories/61093
68983
http://www.securityfocus.com/bid/68983
69738
http://www.securityfocus.com/bid/69738
DSA-3012
http://www.debian.org/security/2014/dsa-3012
GLSA-201602-02
MDVSA-2014:175
http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
RHSA-2014:1110
RHSA-2014:1118
http://rhn.redhat.com/errata/RHSA-2014-1118.html
SUSE-SU-2014:1125
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html
[oss-security] 20170713 Re: [CVE Request] glibc iconv_open buffer overflow (was: Re: Re: glibc locale issues)
http://www.openwall.com/lists/oss-security/2014/08/13/5
[oss-security] 20170713 glibc locale issues
http://www.openwall.com/lists/oss-security/2014/07/14/1
http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html
http://linux.oracle.com/errata/ELSA-2015-0092.html
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
https://code.google.com/p/google-security-research/issues/detail?id=96
https://sourceware.org/bugzilla/show_bug.cgi?id=17187
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.