EulerOS 2.0 SP1 : bash (EulerOS-SA-2017-1163)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote EulerOS host is missing multiple security updates.

Description :

According to the versions of the bash package installed, the EulerOS
installation on the remote host is affected by the following
vulnerabilities :

- An arbitrary command injection flaw was found in the
way bash processed the hostname value. A malicious DHCP
server could use this flaw to execute arbitrary
commands on the DHCP client machines running bash under
specific circumstances. (CVE-2016-0634)

- An arbitrary command injection flaw was found in the
way bash processed the SHELLOPTS and PS4 environment
variables. A local, authenticated attacker could use
this flaw to exploit poorly written setuid programs to
elevate their privileges under certain circumstances.
(CVE-2016-7543)

- A denial of service flaw was found in the way bash
handled popd commands. A poorly written shell script
could cause bash to crash resulting in a local denial
of service limited to a specific bash session.
(CVE-2016-9401)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?09a8d6a5

Solution :

Update the affected bash packages.

Risk factor :

Medium / CVSS Base Score : 6.0
(CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Huawei Local Security Checks

Nessus Plugin ID: 103001 ()

Bugtraq ID:

CVE ID: CVE-2016-0634
CVE-2016-9401

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now