Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8m22-gm6f-5487

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.

Ссылки

EPSS

Процентиль: 100%
0.90099
Критический

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 10 лет назад

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.

redhat
больше 10 лет назад

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.

nvd
больше 10 лет назад

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.

debian
больше 10 лет назад

Off-by-one error in the read_token_word function in parse.y in GNU Bas ...

fstec
больше 10 лет назад

Уязвимость интерпретатора командной строки GNU Bash, позволяющая злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код

EPSS

Процентиль: 100%
0.90099
Критический

Дефекты

CWE-119