GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sat Oct 20, 2012 2:26 am Post subject: [ GLSA 201210-05 ] Bash: Multiple vulnerabilities |
|
|
Gentoo Linux Security Advisory
Title: Bash: Multiple vulnerabilities (GLSA 201210-05)
Severity: normal
Exploitable: local
Date: October 20, 2012
Bug(s): #251319, #431850
ID: 201210-05
Synopsis
Two vulnerabilities have been found in Bash, the worst of which may
allow execution of arbitrary code.
Background
Bash is the standard GNU Bourne Again SHell.
Affected Packages
Package: app-shells/bash
Vulnerable: < 4.2_p37
Unaffected: >= 4.2_p37
Architectures: All supported architectures
Description
Two vulnerabilities have been found in Bash: - Bash example scripts do not handle temporary files securely
(CVE-2008-5374).
- Improper bounds checking in Bash could cause a stack-based buffer
overflow (CVE-2012-3410).
Impact
A remote attacker could entice a user to open a specially crafted Bash
script, possibly resulting in execution of arbitrary code with the
privileges of the process, or a Denial of Service condition of the Bash
executable.
A local attacker may be able to perform symlink attacks to overwrite
arbitrary files with the privileges of the user running the application
or bypass shell access restrictions.
Workaround
There is no known workaround at this time.
Resolution
All Bash users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-shells/bash-4.2_p37"
|
References
CVE-2008-5374
CVE-2012-3410 |
|