4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
7.6 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
22.9%
The remote host is missing a security patch.
# SPDX-FileCopyrightText: 2015 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/h:f5:big-ip";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.105372");
script_cve_id("CVE-2014-7817");
script_tag(name:"cvss_base", value:"4.6");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:P/A:P");
script_version("2024-05-29T05:05:18+0000");
script_name("F5 BIG-IP - GNU C Library (glibc) vulnerability CVE-2014-7817");
script_xref(name:"URL", value:"https://my.f5.com/manage/s/article/K16010");
script_tag(name:"impact", value:"An attacker with local access and knowledge of how to make the glibc function trigger an exploit may be able to run arbitrary code. However, the risk level for this vulnerability is considered LOW because F5 product development has verified that the vulnerable code is NOT used in a way that would make an exploit possible.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing '$((`...`))'. (CVE-2014-7817)");
script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");
script_tag(name:"summary", value:"The remote host is missing a security patch.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"last_modification", value:"2024-05-29 05:05:18 +0000 (Wed, 29 May 2024)");
script_tag(name:"creation_date", value:"2015-09-19 10:38:36 +0200 (Sat, 19 Sep 2015)");
script_category(ACT_GATHER_INFO);
script_family("F5 Local Security Checks");
script_copyright("Copyright (C) 2015 Greenbone AG");
script_dependencies("gb_f5_big_ip_ssh_login_detect.nasl");
script_mandatory_keys("f5/big_ip/version", "f5/big_ip/active_modules");
exit(0);
}
include("f5.inc");
include("host_details.inc");
include("list_array_func.inc");
include("version_func.inc");
if (!version = get_app_version(cpe: CPE, service: "ssh-login"))
exit(0);
check_f5["LTM"] = make_array("affected", "11.0.0-11.6.0;10.1.0-10.2.4;",
"unaffected", "12.0.0;");
check_f5["AAM"] = make_array("affected", "11.4.0-11.6.0;",
"unaffected", "12.0.0;");
check_f5["AFM"] = make_array("affected", "11.3.0-11.6.0;",
"unaffected", "12.0.0;");
check_f5["AVR"] = make_array("affected", "11.0.0-11.6.0;",
"unaffected", "12.0.0;");
check_f5["APM"] = make_array("affected", "11.0.0-11.6.0;10.1.0-10.2.4;",
"unaffected", "12.0.0;");
check_f5["ASM"] = make_array("affected", "11.0.0-11.6.0;10.1.0-10.2.4;",
"unaffected", "12.0.0;");
check_f5["LC"] = make_array("affected", "11.0.0-11.6.0;10.1.0-10.2.4;",
"unaffected", "12.0.0;");
check_f5["PEM"] = make_array("affected", "11.3.0-11.6.0;",
"unaffected", "12.0.0;");
if (report = f5_is_vulnerable(ca: check_f5, version: version)) {
security_message(port: 0, data: report);
exit(0);
}
exit(99);