CVE-2014-6271

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

Published : 2014-09-24 18:48 Updated : 2019-10-09 23:11

10.0
CVSS Score More info
Score 10.0 / 10
10.0
Vendor Product Version URI
Gnu Bash 1.14.6 cpe:/a:gnu:bash:1.14.6
Gnu Bash 2.05 cpe:/a:gnu:bash:2.05:a
Gnu Bash 2.05 cpe:/a:gnu:bash:2.05:b
Gnu Bash 4.2 cpe:/a:gnu:bash:4.2
Gnu Bash 3.2.48 cpe:/a:gnu:bash:3.2.48
Gnu Bash 2.04 cpe:/a:gnu:bash:2.04
Gnu Bash 4.0 cpe:/a:gnu:bash:4.0:rc1
Gnu Bash 3.1 cpe:/a:gnu:bash:3.1
Gnu Bash 4.0 cpe:/a:gnu:bash:4.0
Gnu Bash 4.3 cpe:/a:gnu:bash:4.3
Gnu Bash 2.0 cpe:/a:gnu:bash:2.0
Gnu Bash 3.2 cpe:/a:gnu:bash:3.2
Gnu Bash 4.1 cpe:/a:gnu:bash:4.1
Gnu Bash 2.05 cpe:/a:gnu:bash:2.05
Gnu Bash 3.0 cpe:/a:gnu:bash:3.0
Gnu Bash 3.0.16 cpe:/a:gnu:bash:3.0.16
Gnu Bash 2.02.1 cpe:/a:gnu:bash:2.02.1
Gnu Bash 1.14.0 cpe:/a:gnu:bash:1.14.0
Gnu Bash 2.01 cpe:/a:gnu:bash:2.01
Gnu Bash 1.14.3 cpe:/a:gnu:bash:1.14.3
Gnu Bash 1.14.1 cpe:/a:gnu:bash:1.14.1
Gnu Bash 1.14.4 cpe:/a:gnu:bash:1.14.4
Gnu Bash 1.14.7 cpe:/a:gnu:bash:1.14.7
Gnu Bash 2.01.1 cpe:/a:gnu:bash:2.01.1
Gnu Bash 2.02 cpe:/a:gnu:bash:2.02
Gnu Bash 1.14.2 cpe:/a:gnu:bash:1.14.2
Gnu Bash 2.03 cpe:/a:gnu:bash:2.03
Gnu Bash 1.14.5 cpe:/a:gnu:bash:1.14.5
  1. Gnu (1) Search CVE
    1. Bash (25) Search CVE
      1. 1.14.6
      2. 2.05
      3. 4.2
      4. 3.2.48
      5. 2.04
      6. 4.0
      7. 3.1
      8. 4.3
      9. 2.0
      10. 3.2
      11. 4.1
      12. 3.0
      13. 3.0.16
      14. 2.02.1
      15. 1.14.0
      16. 2.01
      17. 1.14.3
      18. 1.14.1
      19. 1.14.4
      20. 1.14.7
      21. 2.01.1
      22. 2.02
      23. 1.14.2
      24. 2.03
      25. 1.14.5

CWE

ID Name Description Links
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. CVE

References

Source Link
HP http://marc.info/?l=bugtraq&m=142721162228379&w=2
FULLDISC http://seclists.org/fulldisclosure/2014/Oct/0
CONFIRM http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
CONFIRM http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
SECUNIA http://secunia.com/advisories/61547
SUSE http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html
SECUNIA http://secunia.com/advisories/61542
REDHAT http://rhn.redhat.com/errata/RHSA-2014-1294.html
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
HP http://marc.info/?l=bugtraq&m=141216668515282&w=2
CONFIRM http://support.novell.com/security/cve/CVE-2014-6271.html
CONFIRM http://support.apple.com/kb/HT6495
CONFIRM http://www.vmware.com/security/advisories/VMSA-2014-0010.html
CONFIRM https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
SUSE http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686131
HP http://marc.info/?l=bugtraq&m=141383465822787&w=2
EXPLOIT-DB https://www.exploit-db.com/exploits/39918/
CONFIRM https://support.citrix.com/article/CTX200223
HP http://marc.info/?l=bugtraq&m=141585637922673&w=2
SUSE http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html
HP http://marc.info/?l=bugtraq&m=141383304022067&w=2
SUSE http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html
CISCO http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
SUSE http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html
CONFIRM https://access.redhat.com/articles/1200223
HP http://marc.info/?l=bugtraq&m=141383081521087&w=2
CONFIRM https://kc.mcafee.com/corporate/index?page=content&id=SB10085
HP http://marc.info/?l=bugtraq&m=141383196021590&w=2
CONFIRM https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
HP http://marc.info/?l=bugtraq&m=141383353622268&w=2
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685733
CONFIRM http://www.qnap.com/i/en/support/con_show.php?cid=61
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
MISC http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
REDHAT http://rhn.redhat.com/errata/RHSA-2014-1354.html
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685604
SECUNIA http://secunia.com/advisories/62228
MISC http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
MISC http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html
REDHAT http://rhn.redhat.com/errata/RHSA-2014-1295.html
MISC http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html
HP http://marc.info/?l=bugtraq&m=141330468527613&w=2
HP http://marc.info/?l=bugtraq&m=141383138121313&w=2
SUSE http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html
CONFIRM https://kb.bluecoat.com/index?page=content&id=SA82
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686494
CONFIRM http://advisories.mageia.org/MGASA-2014-0388.html
CONFIRM https://www.suse.com/support/shellshock/
APPLE http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
CERT-VN http://www.kb.cert.org/vuls/id/252743
HP http://marc.info/?l=bugtraq&m=141383244821813&w=2
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685749
CONFIRM https://support.citrix.com/article/CTX200217
CONFIRM https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
CONFIRM http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
CONFIRM http://linux.oracle.com/errata/ELSA-2014-1294.html
EXPLOIT-DB https://www.exploit-db.com/exploits/40938/
HP http://marc.info/?l=bugtraq&m=141576728022234&w=2
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686447
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686445
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685541
CONFIRM http://linux.oracle.com/errata/ELSA-2014-1293.html
DEBIAN http://www.debian.org/security/2014/dsa-3032
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21687079
REDHAT http://rhn.redhat.com/errata/RHSA-2014-1293.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
HP http://marc.info/?l=bugtraq&m=141577241923505&w=2
HP http://marc.info/?l=bugtraq&m=141319209015420&w=2
HP http://marc.info/?l=bugtraq&m=142805027510172&w=2
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685914
HP http://marc.info/?l=bugtraq&m=141330425327438&w=2
SUSE http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html
HP http://marc.info/?l=bugtraq&m=141345648114150&w=2
HP http://marc.info/?l=bugtraq&m=141450491804793&w=2
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1141597
CONFIRM https://access.redhat.com/node/1200223
HP http://marc.info/?l=bugtraq&m=141383026420882&w=2
MISC http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
HP http://marc.info/?l=bugtraq&m=141577297623641&w=2
HP http://marc.info/?l=bugtraq&m=141216207813411&w=2
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
SECUNIA http://secunia.com/advisories/59272
CONFIRM http://www.novell.com/support/kb/doc.php?id=7015721
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686479
HP http://marc.info/?l=bugtraq&m=141577137423233&w=2
CONFIRM http://www.novell.com/support/kb/doc.php?id=7015701
SUSE http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html
BID http://www.securityfocus.com/bid/70103
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686246
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
CONFIRM https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
HP http://marc.info/?l=bugtraq&m=141694386919794&w=2
CONFIRM https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
CONFIRM http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686084
HP http://marc.info/?l=bugtraq&m=142358078406056&w=2
HP http://marc.info/?l=bugtraq&m=142546741516006&w=2
HP http://marc.info/?l=bugtraq&m=142719845423222&w=2
HP http://marc.info/?l=bugtraq&m=141879528318582&w=2
HP http://marc.info/?l=bugtraq&m=142113462216480&w=2
HP http://marc.info/?l=bugtraq&m=142118135300698&w=2
JVN http://jvn.jp/en/jp/JVN55667175/index.html
JVNDB http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
HP http://marc.info/?l=bugtraq&m=141235957116749&w=2
CONFIRM https://support.apple.com/kb/HT6535
UBUNTU http://www.ubuntu.com/usn/USN-2362-1
CERT http://www.us-cert.gov/ncas/alerts/TA14-268A
EXPLOIT-DB https://www.exploit-db.com/exploits/40619/
EXPLOIT-DB https://www.exploit-db.com/exploits/38849/
EXPLOIT-DB https://www.exploit-db.com/exploits/37816/
EXPLOIT-DB https://www.exploit-db.com/exploits/34879/
EXPLOIT-DB https://www.exploit-db.com/exploits/42938/
CONFIRM https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
HP http://marc.info/?l=bugtraq&m=142358026505815&w=2
BUGTRAQ http://www.securityfocus.com/archive/1/533593/100/0/threaded
CONFIRM https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes

History of changes

Date Event
2019-09-27 17:37
2018-11-30 21:29
2018-10-09 19:50
2018-08-09 01:29
2017-10-05 05:30
2017-09-17 05:28
2017-09-13 05:28
2017-09-03 05:58
2014-09-24 18:48

New CVE