Lucene search

K
archlinuxArch LinuxASA-201409-2
HistorySep 26, 2014 - 12:00 a.m.

bash: Remote code execution

2014-09-2600:00:00
Arch Linux
lists.archlinux.org
96

0.976 High

EPSS

Percentile

100.0%

GNU Bash through 4.3 bash43-025 processes trailing strings after
certain malformed function definitions in the values of environment
variables, which allows remote attackers to write to files or possibly
have unknown other impact via a crafted environment, as demonstrated by
vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi
and mod_cgid modules in the Apache HTTP Server, scripts executed by
unspecified DHCP clients, and other situations in which setting the
environment occurs across a privilege boundary from Bash execution.

OSVersionArchitecturePackageVersionFilename
anyanyanybash< 4.3.026-1UNKNOWN