Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.debian.org/security/2014/dsa-2976 | vendor advisory |
http://www.securityfocus.com/bid/68505 | vdb entry |
http://www.securitytracker.com/id/1030569 | vdb entry |
https://rhn.redhat.com/errata/RHSA-2014-1110.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/07/14/6 | mailing list |
https://security.gentoo.org/glsa/201602-02 | vendor advisory |
https://sourceware.org/bugzilla/show_bug.cgi?id=17137 | |
http://www.openwall.com/lists/oss-security/2014/07/10/7 | mailing list |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152 | vendor advisory |
http://linux.oracle.com/errata/ELSA-2015-0092.html |