CVE-2016-0634
Published: August 31, 2023Last modified: August 31, 2023
Description
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack Vector | NETWORK |
Attack complexity | HIGH |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | bash | Not affected (5.2.15-r0) |
Stream | bash | Not affected (5.2.15-r7) |
References
- http://rhn.redhat.com/errata/RHSA-2017-0725.html
- http://www.openwall.com/lists/oss-security/2016/09/16/12
- http://www.openwall.com/lists/oss-security/2016/09/16/8
- http://www.openwall.com/lists/oss-security/2016/09/18/11
- http://www.openwall.com/lists/oss-security/2016/09/19/7
- http://www.openwall.com/lists/oss-security/2016/09/20/1
- http://www.openwall.com/lists/oss-security/2016/09/27/9
- http://www.openwall.com/lists/oss-security/2016/09/29/27
- http://www.openwall.com/lists/oss-security/2016/10/07/6
- http://www.openwall.com/lists/oss-security/2016/10/10/3
- http://www.openwall.com/lists/oss-security/2016/10/10/4
- http://www.securityfocus.com/bid/92999
- https://access.redhat.com/errata/RHSA-2017:1931
- https://bugzilla.redhat.com/show_bug.cgi?id=1377613
- https://security.gentoo.org/glsa/201612-39