CVE-2014-7817
Description
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((...))".
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The wordexp function in glibc fails to honor the WRDE_NOCMD flag, allowing attackers to execute arbitrary commands via crafted arithmetic expansion.
Vulnerability
The wordexp function in the GNU C Library (glibc) prior to the patched versions does not properly enforce the WRDE_NOCMD flag when processing arithmetic expansion inputs of the form $((......)). The backticks within the arithmetic expression are evaluated by a shell even though WRDE_NOCMD is intended to forbid command substitution. This vulnerability affects glibc versions 2.17 and earlier on Red Hat Enterprise Linux 7 [1], versions 2.12 and earlier on Oracle Linux 6 [4], and version 2.21 as described in the CVE. The issue was fixed in glibc trunk on November 19, 2014 [3].
Exploitation
An attacker can exploit this flaw by providing input that includes a specially crafted arithmetic expansion containing backtick-embedded commands, such as $((command)). The attacker does not require authentication or special privileges; they only need to supply this input to an application that calls wordexp() with the WRDE_NOCMD flag. The wordexp() function will then execute the commands inside the backticks, bypassing the intended restriction [3].
Impact
Successful exploitation allows an attacker to execute arbitrary shell commands with the privileges of the process that invoked wordexp(). This can lead to full system compromise if the vulnerable process runs with elevated privileges, such as root. The impact includes arbitrary code execution, data disclosure, and potential denial of service [1][2].
Mitigation
Patches are available from the respective vendors. Red Hat released updated glibc packages (version 2.17-55.el7_0.3) in RHSA-2014-2023 [1]. Oracle released updates for Oracle Linux 7 (glibc-2.17-55.0.4.el7_0.5) in ELSA-2015-0092 [2] and for Oracle Linux 6 (glibc-2.12-1.149.el6_6.4) in ELSA-2015-0016 [4]. Users should apply the appropriate updates as soon as possible. No known workarounds exist; updating glibc is the only mitigation.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
15cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- Range: <= 2.21
- osv-coords5 versionspkg:rpm/opensuse/glibc&distro=openSUSE%20Tumbleweedpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 2.24-2.3+ 4 more
- (no CPE)range: < 2.24-2.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
16- linux.oracle.com/errata/ELSA-2015-0092.htmlnvdVendor Advisory
- lists.opensuse.org/opensuse-updates/2015-02/msg00089.htmlnvdVendor Advisory
- rhn.redhat.com/errata/RHSA-2014-2023.htmlnvdVendor Advisory
- www.debian.org/security/2015/dsa-3142nvdVendor Advisory
- linux.oracle.com/errata/ELSA-2015-0016.htmlnvd
- seclists.org/oss-sec/2014/q4/730nvd
- secunia.com/advisories/62100nvd
- secunia.com/advisories/62146nvd
- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlnvd
- www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlnvd
- www.securityfocus.com/bid/71216nvd
- www.ubuntu.com/usn/USN-2432-1nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/98852nvd
- security.gentoo.org/glsa/201602-02nvd
- sourceware.org/bugzilla/show_bug.cginvd
- sourceware.org/git/gitweb.cginvd
News mentions
0No linked articles in our index yet.