CVE-2014-5119
Description
Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Off-by-one error in glibc's __gconv_translit_find allows arbitrary code execution via crafted CHARSET environment variable.
Vulnerability
An off-by-one heap-based buffer overflow exists in the __gconv_translit_find function in gconv_trans.c of the GNU C Library (glibc). The flaw occurs when processing transliteration modules triggered by the CHARSET environment variable during calls to iconv_open(). Affected versions include glibc prior to the patches in Red Hat Enterprise Linux 5, 6, and 7, as well as Oracle Linux 6 and 7 [1][2][4]. The bug allows a single NUL byte to be written beyond the allocated heap buffer.
Exploitation
An attacker can exploit this vulnerability by setting a specially crafted CHARSET environment variable and then invoking an application that calls iconv_open(). This triggers the off-by-one error, writing a NUL byte past the end of a heap buffer. As demonstrated in a Project Zero analysis, this corruption can be leveraged to achieve arbitrary code execution, even with modern glibc heap protections [3]. The exploit requires the attacker to have the ability to control the environment variables of a vulnerable setuid binary or any application using iconv_open().
Impact
Successful exploitation allows an attacker to execute arbitrary code with the privileges of the affected application. In the case of setuid binaries like pkexec, this can lead to local privilege escalation to root [3]. The impact is rated as Important by Red Hat, with a CVSS base score of 6.9 (AV:L/AC:M/Au:N/C:C/I:C/A:C) [2].
Mitigation
Red Hat released updated glibc packages (e.g., glibc-2.17-55.el7_0.1 for RHEL 7) on August 29, 2014 [1][2]. Oracle Linux followed with updates in January 2015 (ELSA-2015-0092) that also removed support for gconv transliteration loadable modules as a hardening measure [4]. Users should apply the relevant security updates from their distribution. No workaround is available other than removing the transliteration module support, which may break functionality relying on character set conversion.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
4- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
22- googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.htmlnvdThird Party Advisory
- linux.oracle.com/errata/ELSA-2015-0092.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1118.htmlnvdThird Party Advisory
- seclists.org/fulldisclosure/2014/Aug/69nvdMailing ListThird Party Advisory
- secunia.com/advisories/60345nvdThird Party Advisory
- secunia.com/advisories/60358nvdThird Party Advisory
- secunia.com/advisories/60441nvdThird Party Advisory
- secunia.com/advisories/61074nvdThird Party Advisory
- secunia.com/advisories/61093nvdThird Party Advisory
- tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-5119nvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www.debian.org/security/2014/dsa-3012nvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.openwall.com/lists/oss-security/2014/07/14/1nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2014/08/13/5nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/68983nvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/69738nvdThird Party AdvisoryVDB Entry
- code.google.com/p/google-security-research/issues/detailnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1110.htmlnvdThird Party Advisory
- security.gentoo.org/glsa/201602-02nvdThird Party Advisory
- sourceware.org/bugzilla/show_bug.cginvdIssue TrackingThird Party Advisory
News mentions
0No linked articles in our index yet.