Versio.io

CVE-2019-18276

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 28-11-2019 02:15
Last modified: - 07-06-2022 08:41
Total changes: - 6

Description

An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
7.8
Base score
1.8
5.9
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=gnu AND product=bash AND versionEndIncluding=5.0
vendor=gnu AND product=bash AND version=5.0 AND update=patch1
vendor=gnu AND product=bash AND version=5.0 AND update=patch2
vendor=gnu AND product=bash AND version=5.0 AND update=patch3
vendor=gnu AND product=bash AND version=5.0 AND update=patch4
vendor=gnu AND product=bash AND version=5.0 AND update=patch5
vendor=gnu AND product=bash AND version=5.0 AND update=patch6
vendor=gnu AND product=bash AND version=5.0 AND update=patch7
vendor=gnu AND product=bash AND version=5.0 AND update=patch8
vendor=gnu AND product=bash AND version=5.0 AND update=patch9
vendor=gnu AND product=bash AND version=5.0 AND update=patch10
vendor=gnu AND product=bash AND version=5.0 AND update=patch11
vendor=gnu AND product=bash AND version=5.0 AND update=beta1
vendor=gnu AND product=bash AND version=5.0 AND update=beta2
vendor=gnu AND product=bash AND version=5.0 AND update=rc1
OR
vendor=netapp AND product=solidfire AND version=-
vendor=netapp AND product=hci_management_node AND version=-
vendor=netapp AND product=oncommand_unified_manager AND target_software=vmware_vsphere AND versionStartIncluding=9.5
OR
vendor=oracle AND product=communications_cloud_native_core_policy AND version=1.14.0
 

Reference

 


Keywords

NVD

 

CVE-2019-18276

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.