Описание
Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w option in the PS1 environmental variable when another user changes into that directory.
Ссылки
- PatchVendor Advisory
- ExploitVendor Advisory
- PatchVendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*
EPSS
Процентиль: 26%
0.00087
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w option in the PS1 environmental variable when another user changes into that directory.
EPSS
Процентиль: 26%
0.00087
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other