First published: Mon Jun 17 2019(Updated: )
A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv().
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Bash | >=4.2<=4.3 | |
Redhat Enterprise Linux | =7.0 | |
debian/bash | 5.1-2+deb11u1 5.2.15-2 5.2.32-1 | |
redhat/bash | <4.3 | 4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2012-6711.
CVE-2012-6711 has a severity rating of 7.8 (high).
The affected software for CVE-2012-6711 includes GNU Bash versions before 4.3, Debian bash versions 5.0-4, 5.1-2+deb11u1, and 5.2.15-2, Ubuntu bash version 4.3-1, GNU Bash versions 4.2 and earlier, and Redhat Enterprise Linux version 7.0.
To fix CVE-2012-6711, you should update GNU Bash to version 4.3 or later, Debian bash to versions 5.0-4, 5.1-2+deb11u1, or 5.2.15-2, Ubuntu bash to version 4.3-1, or Redhat Enterprise Linux to a version higher than 7.0.
You can find more information about CVE-2012-6711 at the following references: [1] http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5, [2] https://bugzilla.redhat.com/show_bug.cgi?id=1721071, [3] http://www.securityfocus.com/bid/108824.