CVE-2019-18276

CWE-273CWE-27111 documents10 sources
Severity
7.8HIGH
EPSS
49.6%
top 2.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 28
Latest updateMay 24

Description

An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared objec

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-jcxc-5f87-vq5m: An issue was discovered in disable_priv_mode in shell2022-05-24
OSV
CVE-2019-18276: An issue was discovered in disable_priv_mode in shell2019-11-28
CVEList
CVE-2019-18276: An issue was discovered in disable_priv_mode in shell2019-11-28

📋Vendor Advisories

5
Ubuntu
Bash vulnerability2022-04-20
Oracle
Oracle Oracle Communications Risk Matrix: Policy (GNU Bash) — CVE-2019-182762022-04-15
Microsoft
An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default if Bash is run with its effective UID not equal to its real UID it will drop privileges by setting 2019-11-12
Red Hat
bash: when effective UID is not equal to its real UID the saved UID is not dropped2019-07-01
Debian
CVE-2019-18276: bash - An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 ...2019

💬Community

2
Bugzilla
CVE-2019-18276 bash: when effective UID is not equal to its real UID the saved UID is not dropped2019-11-29
Bugzilla
CVE-2019-18276 bash: when effective UID is not equal to its real UID the saved UID is not dropped [fedora-all]2019-11-29