Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9p4p-8m7m-jjq4

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w option in the PS1 environmental variable when another user changes into that directory.

Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w option in the PS1 environmental variable when another user changes into that directory.

EPSS

Процентиль: 26%
0.00087
Низкий

Связанные уязвимости

nvd
почти 27 лет назад

Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w option in the PS1 environmental variable when another user changes into that directory.

EPSS

Процентиль: 26%
0.00087
Низкий