Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-3410

Опубликовано: 27 авг. 2012
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 4.6

Описание

Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.

РелизСтатусПримечание
devel

not-affected

4.2-4ubuntu1
esm-infra-legacy/trusty

not-affected

4.2-4ubuntu1
hardy

ignored

end of life
lucid

ignored

natty

ignored

end of life
oneiric

ignored

end of life
precise

ignored

quantal

not-affected

4.2-4ubuntu1
raring

not-affected

4.2-4ubuntu1
saucy

not-affected

4.2-4ubuntu1

Показывать по

EPSS

Процентиль: 24%
0.00083
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.

nvd
больше 13 лет назад

Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.

debian
больше 13 лет назад

Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 ...

github
больше 3 лет назад

Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.

fstec
больше 13 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 24%
0.00083
Низкий

4.6 Medium

CVSS2