CVE-2014-2886

NameCVE-2014-2886
DescriptionGKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during installation of a VirtualBox extension pack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gksu (PTS)wheezy2.0.2-6vulnerable
buster, sid, jessie, stretch2.0.2-9vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gksusource(unstable)(unfixed)medium

Notes

[stretch] - gksu <no-dsa> (Minor issue)
[jessie] - gksu <no-dsa> (Minor issue)
[wheezy] - gksu <no-dsa> (Minor issue)
[squeeze] - gksu <no-dsa> (Minor issue)
https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu
In Debian libgksu installs two alternatives gconf-defaults.libgksu-sudo
and gconf-defaults.libgksu-su, where the gconf-defaults.libgksu-su is
enabled (in auto mode).

Search for package or bug name: Reporting problems