CVE-2019-18276

An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
gnubash
𝑥
≤ 5.0
gnubash
5.0:beta1
gnubash
5.0:beta2
gnubash
5.0:patch1
gnubash
5.0:patch10
gnubash
5.0:patch11
gnubash
5.0:patch2
gnubash
5.0:patch3
gnubash
5.0:patch4
gnubash
5.0:patch5
gnubash
5.0:patch6
gnubash
5.0:patch7
gnubash
5.0:patch8
gnubash
5.0:patch9
gnubash
5.0:rc1
netapphci_management_node
-
netapponcommand_unified_manager
9.5 ≤
netappsolidfire
-
oraclecommunications_cloud_native_core_policy
1.14.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
bash
bullseye
5.1-2+deb11u1
fixed
bookworm
5.2.15-2
fixed
sid
5.2.32-1
fixed
trixie
5.2.32-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
bash
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
ignored
focal
Fixed 5.0-6ubuntu1.2
released
eoan
ignored
disco
ignored
bionic
Fixed 4.4.18-2ubuntu1.3
released
xenial
Fixed 4.3-14ubuntu1.4+esm1
released
trusty
Fixed 4.3-7ubuntu1.8+esm2
released