First published: Fri Sep 13 1996(Updated: )
(1) bash before 1.14.7, and (2) tcsh 6.05 allow local users to gain privileges via directory names that contain shell metacharacters (` back-tick), which can cause the commands enclosed in the directory name to be executed when the shell expands filenames using the \w option in the PS1 variable.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Bash | <=1.14.6 | |
GNU Bash | =1.14.0 | |
GNU Bash | =1.14.1 | |
GNU Bash | =1.14.2 | |
GNU Bash | =1.14.3 | |
GNU Bash | =1.14.4 | |
GNU Bash | =1.14.5 | |
Tcsh | =6.05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1383 is considered a local privilege escalation vulnerability affecting certain versions of bash and tcsh.
To fix CVE-1999-1383, upgrade to bash version 1.14.7 or later, or to a version of tcsh that is beyond 6.05.
CVE-1999-1383 affects GNU Bash versions prior to 1.14.7 and Tcsh version 6.05.
CVE-1999-1383 cannot be exploited remotely as it requires local access to the system.
Systems using vulnerable versions of bash or tcsh, particularly in environments where users have local access, are at risk for CVE-1999-1383.