CVE-2016-9401

CWE-416Use After Free10 documents8 sources
Severity
5.5MEDIUM
EPSS
0.1%
top 80.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 23
Latest updateMay 13

Description

popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

NVDgnu/bash< 4.4+1
Debianbash< 4.4-3+3

Also affects: Debian Linux 8.0, Enterprise Linux 7.4, 7.6, 7.7, 7.5

🔴Vulnerability Details

4
GHSA
GHSA-888p-vvcc-q364: popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address2022-05-13
OSV
bash vulnerabilities2017-05-17
OSV
CVE-2016-9401: popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address2017-01-23
CVEList
CVE-2016-9401: popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address2017-01-23

📋Vendor Advisories

3
Ubuntu
Bash vulnerabilities2017-05-17
Red Hat
bash: popd controlled free2016-11-17
Debian
CVE-2016-9401: bash - popd in bash might allow local users to bypass the restricted shell and cause a ...2016

💬Community

2
Bugzilla
CVE-2016-9401 bash: popd controlled free2016-11-18
Bugzilla
CVE-2016-9401 bash: popd controlled use-after-free [fedora-all]2016-11-18