GNU Bash is prone to a local heap-based buffer-overflow vulnerability because it fails to perform adequate boundary-checks on user supplied data.
An attacker may exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will likely cause denial-of-service conditions.
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Bugtraq ID: | 108824 |
Class: | Boundary Condition Error |
CVE: | CVE-2012-6711 |
Remote: | No |
Local: | Yes |
Published: | Jun 18 2019 12:00AM |
Updated: | Jun 18 2019 12:00AM |
Credit: | Erez Turjeman |
Vulnerable: | Redhat Enterprise Linux 7 GNU GNU bash 4.2 |
Not Vulnerable: | GNU GNU bash 4.3 |
References:
from SecurityFocus Vulnerabilities http://bit.ly/2L37tNO
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.