CVE-2014-2886

GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during installation of a VirtualBox extension pack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nongnu:gksu:2.0.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:07

Type Values Removed Values Added
References () http://savannah.nongnu.org/bugs/?40023 - () http://savannah.nongnu.org/bugs/?40023 -
References () https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu - Exploit () https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu - Exploit
References () https://launchpad.net/bugs/1186676 - () https://launchpad.net/bugs/1186676 -
References () https://security.gentoo.org/glsa/201812-10 - () https://security.gentoo.org/glsa/201812-10 -

Information

Published : 2014-09-18 10:55

Updated : 2024-11-21 02:07


NVD link : CVE-2014-2886

Mitre link : CVE-2014-2886

CVE.ORG link : CVE-2014-2886


JSON object : View

Products Affected

nongnu

  • gksu
CWE
CWE-264

Permissions, Privileges, and Access Controls