CVE-2014-2886
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during installation of a VirtualBox extension pack.
GKSu 2.0.2, cuando el modo sudo no está habilitado, utiliza caracteres ' (dobles comillas) en un argumento de gksu-run-helper, lo cual permite a atacantes ejecutar comandos en ciertas situaciones relacionando una subcadena no confiable dentro de este argumento, tal y como fue demostrado mediante un nombre de fichero no confiable encontrado durante la instalación de un paquete de extensión de VirtualBox.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-04-17 CVE Reserved
- 2014-09-18 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2024-09-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://savannah.nongnu.org/bugs/?40023 | X_refsource_misc | |
https://launchpad.net/bugs/1186676 | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201812-10 | 2018-12-31 |