Security Bulletin
Summary
Proof of Concept exploit code, which uses a flaw in glibc that can allow a local unprivileged user to gain root on a Linux machine. This affects virtual machines deployed by IBM PureApplication System using the IBM OS Image for RedHat Linux (version 2.0, 2.0.0.1, 2.0.0.2, 2.0.0.3, 2.0.0.4 and 2.1.0.0).
Vulnerability Details
VULNERABILITY DETAILS
The GNU C Library (glibc) is vulnerable to a heap-based buffer overflow, caused by an off-by-one error in the __gconv_translit_find() function. By setting the CHARSET environment variable to a malicious value, a local attacker could exploit this vulnerability to overflow a buffer and execute arbitrary code on the system with root privileges.
CVE ID: CVE-2014-5119
DESCRIPTION: Proof of Concept exploit code, which uses a flaw in glibc that can allow a local unprivileged user to gain root on Linux machine
CVSS:
CVSS Base Score: 7.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/95044 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C)
AFFECTED PRODUCTS AND VERSIONS:
REMEDIATION:
A patch for the glibc is provided by the OS vendors. Apply this patch, with the following direction:
· Run the “yum update glibc” within the deployed vm to upgrade to the latest version of glibc.
WORKAROUND(S) and MITIGATION(S):
None
ACKNOWLEDGEMENT:
None
CHANGE HISTORY:
26 September 2014 - Original Copy Published
Get Notified about Future Security Bulletins
References
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
15 June 2018
UID
swg21685471