Описание
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
An arbitrary command injection flaw was found in the way bash processed the hostname value. A malicious DHCP server could use this flaw to execute arbitrary commands on the DHCP client machines running bash under specific circumstances.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | bash | Will not fix | ||
| Red Hat Enterprise Linux 6 | bash | Fixed | RHSA-2017:0725 | 21.03.2017 |
| Red Hat Enterprise Linux 7 | bash | Fixed | RHSA-2017:1931 | 01.08.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.9 Medium
CVSS3
3.7 Low
CVSS2
Связанные уязвимости
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
The expansion of '\h' in the prompt string in bash 4.3 allows remote a ...
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
EPSS
4.9 Medium
CVSS3
3.7 Low
CVSS2