CVE-2017-5932
Summary
| CVE | CVE-2017-5932 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-03-27 15:59:00 UTC |
| Updated | 2017-03-31 11:24:00 UTC |
| Description | The path autocompletion feature in Bash 4.4 allows local users to gain privileges via a crafted filename starting with a " (double quote) character and a command substitution metacharacter. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-security - Re: CVE Request - Code execution vulnerability in GNU/bash v4.4 autocompletion | MLIST | www.openwall.com | Mailing List, Patch, Third Party Advisory |
| Bash-4.4 Official Patch 7 | MLIST | lists.gnu.org | Mailing List, Patch, Vendor Advisory |
| GNU Bash CVE-2017-5932 Multiple Arbitrary Code Execution Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| bash.git - bash | CONFIRM | git.savannah.gnu.org | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.