First published: Fri Jan 16 2015(Updated: )
The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU coreutils | <8.23 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9471 has a high severity rating as it can lead to a denial of service or arbitrary code execution.
To mitigate CVE-2014-9471, update GNU coreutils to version 8.24 or later, or apply vendor patches if available.
CVE-2014-9471 affects GNU coreutils versions up to 8.23 and several versions of Ubuntu Linux including 10.04, 12.04, and 14.04.
Yes, CVE-2014-9471 can be exploited remotely through crafted date strings in command executions.
The commands 'touch' and 'date' exhibit vulnerability due to CVE-2014-9471 when provided with malicious input.