Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 20 Nov 2014 19:17:22 +0000
From: mancha <>
Subject: Re: CVE-2014-7817 glibc: command execution in
 wordexp() with WRDE_NOCMD specified

On Thu, Nov 20, 2014 at 11:38:20AM -0500, Francisco Alonso wrote:
> Hello,
> It was discovered that the wordexp() function could ignore the WRDE_NOCMD flag under certain input conditions resulting in the execution 
> of a shell for command substitution when the applicaiton did not request it. 
> Bug report:
> Git commit:
> References:

Francisco, thanks for the post.

After a lightning review of one of my systems, I found the following use
glibc's wordexp: adobe's flash plugin, ardour2, mailx, enca. I've not
looked into which input is under a would-be-attacker's control.


Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.