First published: Fri Nov 18 2016(Updated: )
A vulnerability was found in popd. It can be tricked to free a user supplied address in the following way: $ popd +-111111 This could be used to bypass restricted shells (rsh) on some environments to cause use-after-free. References: <a href="http://seclists.org/oss-sec/2016/q4/445">http://seclists.org/oss-sec/2016/q4/445</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Bash | <4.4 | |
GNU Bash | =4.4-patch1 | |
GNU Bash | =4.4-patch2 | |
GNU Bash | =4.4-patch3 | |
GNU Bash | =4.4-patch4 | |
GNU Bash | =4.4-patch5 | |
Debian | =8.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9401 is considered a moderate severity vulnerability because it can be exploited to cause a use-after-free condition.
To fix CVE-2016-9401, users should update to a patched version of GNU Bash that includes the security fix.
CVE-2016-9401 affects GNU Bash versions prior to 4.4 and specific patched versions of 4.4.
Exploitation of CVE-2016-9401 could allow an attacker to bypass restricted shells and execute unauthorized commands.
Versions of GNU Bash that have been patched after 4.4 or any version higher than 4.4 are safe from CVE-2016-9401.