First published: Fri Aug 29 2014(Updated: )
Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | <2.20 | |
Debian GNU/Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5119 has a severity rating that indicates it can lead to a denial of service or arbitrary code execution, alerting users of potential significant risks.
To fix CVE-2014-5119, update to a version of glibc that is greater than 2.20, as this vulnerability has been addressed in subsequent releases.
CVE-2014-5119 affects glibc versions prior to 2.20 inclusive.
CVE-2014-5119 impacts systems running affected versions of the GNU C Library, particularly Debian GNU/Linux 7.0 and earlier.
CVE-2014-5119 can be exploited by context-dependent attackers to potentially cause a denial of service or execute arbitrary code through manipulation of the CHARSET environment variable.