Open mend-for-github-com[bot] opened 4 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2019-9924 - High Severity Vulnerability
Vulnerable Library - srcdc68203c791d61132fb706541d939ef160c2e638
Public git conversion mirror of OpenBSD's official CVS src repository. Pull requests not accepted - send diffs to the tech@ mailing list.
Library home page: https://github.com/openbsd/src.git
Found in HEAD commit: 250560ac3a6cd973d828db0972dd561343848d2b
Vulnerable Source Files (3)
/gnu/lib/libreadline/vi_keymap.c /gnu/lib/libreadline/vi_keymap.c /gnu/lib/libreadline/vi_keymap.c
Vulnerability Details
rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.
Publish Date: 2019-03-22
URL: CVE-2019-9924
CVSS 3 Score Details (7.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9924
Release Date: 2019-03-22
Fix Resolution: 4.4-beta2