First published: Sat Sep 05 1998(Updated: )
Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w option in the PS1 environmental variable when another user changes into that directory.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =1.3.1 | |
Red Hat Linux | =4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1048 is considered a high severity vulnerability due to its potential to allow local attackers to gain elevated privileges.
To fix CVE-1999-1048, update bash to a version that is not vulnerable to buffer overflow exploitation.
CVE-1999-1048 affects bash versions 2.0.0, 1.4.17, and other versions on systems such as Debian 1.3.1 and Red Hat Linux 4.2.
CVE-1999-1048 is caused by a buffer overflow that occurs when bash processes an oversized directory name through the PS1 environmental variable.
CVE-1999-1048 cannot be exploited remotely; it requires local access to the vulnerable system.