CVE-2016-0634
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
28/08/2017
Last modified:
20/04/2025
Description
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
6.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rhn.redhat.com/errata/RHSA-2017-0725.html
- http://www.openwall.com/lists/oss-security/2016/09/16/12
- http://www.openwall.com/lists/oss-security/2016/09/16/8
- http://www.openwall.com/lists/oss-security/2016/09/18/11
- http://www.openwall.com/lists/oss-security/2016/09/19/7
- http://www.openwall.com/lists/oss-security/2016/09/20/1
- http://www.openwall.com/lists/oss-security/2016/09/27/9
- http://www.openwall.com/lists/oss-security/2016/09/29/27
- http://www.openwall.com/lists/oss-security/2016/10/07/6
- http://www.openwall.com/lists/oss-security/2016/10/10/3
- http://www.openwall.com/lists/oss-security/2016/10/10/4
- http://www.securityfocus.com/bid/92999
- https://access.redhat.com/errata/RHSA-2017:1931
- https://bugzilla.redhat.com/show_bug.cgi?id=1377613
- https://security.gentoo.org/glsa/201612-39
- http://rhn.redhat.com/errata/RHSA-2017-0725.html
- http://www.openwall.com/lists/oss-security/2016/09/16/12
- http://www.openwall.com/lists/oss-security/2016/09/16/8
- http://www.openwall.com/lists/oss-security/2016/09/18/11
- http://www.openwall.com/lists/oss-security/2016/09/19/7
- http://www.openwall.com/lists/oss-security/2016/09/20/1
- http://www.openwall.com/lists/oss-security/2016/09/27/9
- http://www.openwall.com/lists/oss-security/2016/09/29/27
- http://www.openwall.com/lists/oss-security/2016/10/07/6
- http://www.openwall.com/lists/oss-security/2016/10/10/3
- http://www.openwall.com/lists/oss-security/2016/10/10/4
- http://www.securityfocus.com/bid/92999
- https://access.redhat.com/errata/RHSA-2017:1931
- https://bugzilla.redhat.com/show_bug.cgi?id=1377613
- https://security.gentoo.org/glsa/201612-39



