Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-0634

Опубликовано: 28 авг. 2017
Источник: debian
EPSS Низкий

Описание

The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bashfixed4.4-1package
bashfixed4.3-11+deb8u1jessiepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2016/09/16/8

  • https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1507025

  • Fixed bin Bash upstream bash-4.4

  • This doesn't cross any reasonable security boundaries, an attacker with the

  • ability to modify the hostname in an arbitrary manner is in the position to

  • exploit various other system components anyway

  • Fixed by (4.3): https://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-047

EPSS

Процентиль: 80%
0.01448
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.

CVSS3: 4.9
redhat
около 10 лет назад

The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.

CVSS3: 7.5
nvd
около 8 лет назад

The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.

CVSS3: 7.5
github
больше 3 лет назад

The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.

suse-cvrf
больше 7 лет назад

Security update for bash

EPSS

Процентиль: 80%
0.01448
Низкий
Уязвимость CVE-2016-0634