CVE-2016-0634
Published: August 31, 2023Last modified: July 22, 2025
Description
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.5 |
| Attack Vector | NETWORK |
| Attack complexity | HIGH |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | bash | Not affected (5.2.15-r0) |
| Stream | bash | Not affected (5.2.15-r7) | |
| Hardened Containers | 23 LTS | bash | Not affected (5.2.15-r0) |
| Stream | bash | Not affected (5.2.15-r7) |
References
- http://rhn.redhat.com/errata/RHSA-2017-0725.html
- http://www.openwall.com/lists/oss-security/2016/09/16/12
- http://www.openwall.com/lists/oss-security/2016/09/16/8
- http://www.openwall.com/lists/oss-security/2016/09/18/11
- http://www.openwall.com/lists/oss-security/2016/09/19/7
- http://www.openwall.com/lists/oss-security/2016/09/20/1
- http://www.openwall.com/lists/oss-security/2016/09/27/9
- http://www.openwall.com/lists/oss-security/2016/09/29/27
- http://www.openwall.com/lists/oss-security/2016/10/07/6
- http://www.openwall.com/lists/oss-security/2016/10/10/3
- http://www.openwall.com/lists/oss-security/2016/10/10/4
- http://www.securityfocus.com/bid/92999
- https://access.redhat.com/errata/RHSA-2017:1931
- https://bugzilla.redhat.com/show_bug.cgi?id=1377613
- https://security.gentoo.org/glsa/201612-39