1
Candidate: CVE-2014-2886
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2886
5
https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu
6
https://launchpad.net/bugs/1186676
7
http://savannah.nongnu.org/bugs/?40023
9
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters
10
in a gksu-run-helper argument, which allows attackers to execute arbitrary
11
commands in certain situations involving an untrusted substring within this
12
argument, as demonstrated by an untrusted filename encountered during
13
installation of a VirtualBox extension pack.
16
mdeslaur> in Ubuntu, sudo-mode is the default, and the root account has
17
mdeslaur> no password. On top of that, the fault actually lies in
18
mdeslaur> VirtualBox that is not properly escaping the filename before
19
mdeslaur> calling gksu.
27
lucid_gksu: ignored (reached end-of-life)
28
precise_gksu: ignored (reached end-of-life)
29
precise/esm_gksu: DNE (precise was needed)
31
utopic_gksu: ignored (reached end-of-life)
32
vivid_gksu: ignored (reached end-of-life)
33
vivid/stable-phone-overlay_gksu: DNE
34
vivid/ubuntu-core_gksu: DNE
35
wily_gksu: ignored (reached end-of-life)
37
yakkety_gksu: ignored (reached end-of-life)
38
zesty_gksu: ignored (reached end-of-life)