CVE-2014-4043Code Injection in Glibc

CWE-94Code Injection9 documents8 sources
Severity
7.5HIGHNVD
EPSS
1.6%
top 18.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 6
Latest updateMay 14

Description

The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

Debiangnu/glibc< 2.19-2+3
NVDgnu/glibc2.19

🔴Vulnerability Details

3
GHSA
GHSA-7fjc-2773-f7m5: The posix_spawn_file_actions_addopen function in glibc before 22022-05-14
CVEList
CVE-2014-4043: The posix_spawn_file_actions_addopen function in glibc before 22014-10-06
OSV
CVE-2014-4043: The posix_spawn_file_actions_addopen function in glibc before 22014-10-06

📋Vendor Advisories

3
Ubuntu
GNU C Library vulnerabilities2014-08-04
Red Hat
glibc: posix_spawn_file_actions_addopen fails to copy the path argument2014-06-11
Debian
CVE-2014-4043: glibc - The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy...2014

💬Community

2
Bugzilla
CVE-2014-4043 glibc: posix_spawn_file_actions_addopen fails to copy the path argument [fedora-all]2014-06-16
Bugzilla
CVE-2014-4043 glibc: posix_spawn_file_actions_addopen fails to copy the path argument2014-06-13
CVE-2014-4043 — Code Injection in GNU Glibc | cvebase