6
CVSSv2

CVE-2016-0634

Published: 28/08/2017 Updated: 05/01/2018
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 536
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu bash 4.3

Vendor Advisories

Synopsis Moderate: bash security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for bash is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base sco ...
Several security issues were fixed in Bash ...
popd controlled free:A denial of service flaw was found in the way bash handled popd commands A poorly written shell script could cause bash to crash resulting in a local denial of service limited to a specific bash session(CVE-2016-9401) Arbitrary code execution via malicious hostname:An arbitrary command injection flaw was found in the way bash ...
An arbitrary command injection flaw was found in the way bash processed the hostname value A malicious DHCP server could use this flaw to execute arbitrary commands on the DHCP client machines running bash under specific circumstances ...