Vulnerability Details : CVE-2014-9471
Potential exploit
The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2014-9471
- cpe:2.3:a:gnu:coreutils:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-9471
1.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-9471
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2014-9471
-
https://security.gentoo.org/glsa/201612-22
Coreutils: Arbitrary code execution (GLSA 201612-22) — Gentoo securityThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/01/03/11
oss-security - Re: parse_datetime() bug in coreutilsExploit;Mailing List;Third Party Advisory
-
http://advisories.mageia.org/MGASA-2015-0029.html
Mageia Advisory: MGASA-2015-0029 - Updated coreutils packages fix CVE-2014-9471Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:179
mandriva.comBroken Link
-
http://ubuntu.com/usn/usn-2473-1
USN-2473-1: coreutils vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/11/25/4
oss-security - AW: parse_datetime() bug in coreutilsMailing List;Third Party Advisory
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147
#766147 - php5-common: session cleanup can be misused to change modification time of arbitrary files to "now" when symlink protection not enabled - Debian Bug report logsExploit;Issue Tracking;Third Party Advisory
-
http://debbugs.gnu.org/cgi/bugreport.cgi?bug=16872
#16872 - `date -d 'TZ="America/Los_Angeles" "00:00 + 1 hour"'` crashes - GNU bug report logsExploit;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/11/25/1
oss-security - parse_datetime() bug in coreutilsExploit;Mailing List;Third Party Advisory
Jump to