|
|
| |
| GNU Bash is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. |
| |
Credit:
The original article can be found at: http://www.securityfocus.com/bid/54937
The information has been provided by Henri Salo .
|
| |
Vulnerable Systems:
*GNU GNU bash 4.2
An attacker can exploit this issue to cause the application to crash or execute arbitrary code in the context of the affected application.
Vendor Status:
Vendor as issued an updated vulnerability.
Patch Availability:
http://www.gnu.org/
CVE Information:
CVE-2012-3410
Disclosure Timeline:
Initial Release: Published: Aug 09 2012
|
|
blog comments powered by
|