First published: Thu Sep 18 2014(Updated: )
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during installation of a VirtualBox extension pack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nongnu Gksu | =2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2886 is considered a high severity vulnerability due to its potential for arbitrary command execution.
To fix CVE-2014-2886, ensure that gksu is updated to a version later than 2.0.2 or apply relevant security patches.
CVE-2014-2886 specifically affects gksu version 2.0.2 on systems where sudo-mode is not enabled.
The potential impacts of CVE-2014-2886 include unauthorized command execution, which can compromise system security.
CVE-2014-2886 exploitation typically requires local access to the system, making remote exploitation less likely.