Vulnerability Description
Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w option in the PS1 environmental variable when another user changes into that directory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 1.3.1 |
| Redhat | Linux | 4.2 |
References
- http://marc.info/?l=bugtraq&m=87602746719555&w=2
- http://www.debian.org/security/1998/19980909PatchVendor Advisory
- http://www.osvdb.org/8345
- http://www.securityfocus.com/archive/1/10542ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/3414
- http://marc.info/?l=bugtraq&m=87602746719555&w=2
- http://www.debian.org/security/1998/19980909PatchVendor Advisory
- http://www.osvdb.org/8345
- http://www.securityfocus.com/archive/1/10542ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/3414
FAQ
What is CVE-1999-1048?
CVE-1999-1048 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w...
How severe is CVE-1999-1048?
CVE-1999-1048 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-1999-1048?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Redhat Linux.