Bug 1757324 (CVE-2019-14868)
Summary: | CVE-2019-14868 ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | kdudka, mhlavink, pasteur, rschiron, security-response-team, stephane+rh, svashisht |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the way ksh evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-02-05 14:09:33 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1790542, 1790543, 1790544, 1790545, 1790546, 1790547, 1790549, 1813403, 1813404, 1813405, 1900646, 1900647, 1900648, 1900649 | ||
Bug Blocks: | 1757327 |
Description
Marian Rehak
2019-10-01 08:45:01 UTC
(In reply to Marian Rehak from comment #1) > Acknowledgments: > > Name: Stephane Chazelas Actually, most of the issues were found by Oliver Kiddle (zsh developer). During ksh startup, environment variables that are expected to contain a number are evaluated as an arithmetic expression. If an attacker is able to set specially crafted values in one of these environment variables before a ksh shell is executed (either directly or through a script), he could execute arbitrary commands before shell restrictions are in place. In case of services and applications that use ksh scripts and allow remote users to provide one of the arithmetic environment variables, it could allow an attacker to exploit this issue. Created ksh tracking bugs for this issue: Affects: fedora-all [bug 1790549] Mitigation: No known mitigation available. This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:0431 https://access.redhat.com/errata/RHSA-2020:0431 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-14868 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2020:0515 https://access.redhat.com/errata/RHSA-2020:0515 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:0559 https://access.redhat.com/errata/RHSA-2020:0559 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:0568 https://access.redhat.com/errata/RHSA-2020:0568 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2020:1332 https://access.redhat.com/errata/RHSA-2020:1332 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:1333 https://access.redhat.com/errata/RHSA-2020:1333 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2020:2210 https://access.redhat.com/errata/RHSA-2020:2210 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Advanced Update Support Via RHSA-2020:5352 https://access.redhat.com/errata/RHSA-2020:5352 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Via RHSA-2020:5351 https://access.redhat.com/errata/RHSA-2020:5351 |