Lucene search

K
rosalinuxROSA LABROSA-SA-2021-1802
HistoryJul 02, 2021 - 4:30 p.m.

Advisory ROSA-SA-2021-1802

2021-07-0216:30:14
ROSA LAB
abf.rosalinux.ru
3

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

42.9%

Software: bash 4.2.46
OS: Cobalt 7.9

CVE-ID: CVE-2012-6711
CVE-Crit: HIGH
CVE-DESC: A heap-based buffer overflow exists in GNU Bash before 4.3, when broad characters not supported by the current language standard set in the LC_CTYPE environment variable are printed using the built-in echo function. A local attacker who can provide print data using the built-in “echo -e” function can exploit this vulnerability to crash a script or execute code with bash process privileges. This happens because ansicstr () in lib / sh / strtrans.c does not properly handle u32cconv ().
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2019-18276
CVE-Crit: HIGH
CVE-DESC: A problem was found in disable_priv_mode in shell.c in GNU Bash before version 5.0, patch 11. By default, if Bash runs with its effective UID not equal to its real UID, it loses privileges by setting its effective UID to its real UID. However, it does this incorrectly. On Linux and other systems that support the “saved UID” feature, the saved UID is not deleted. An attacker executing a shell command could use “enable -f” to bootstrap while executing a new built-in function, which could be a generic object that calls setuid () and therefore restores privileges. However, binaries running with an effective UID of 0 are not affected.
CVE-STATUS: default
CVE-REV: default

OSVersionArchitecturePackageVersionFilename
Cobaltanynoarchbash< 4.2.46UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

42.9%