10

CVE-2014-6271

Warnung
Exploit

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GnuBash Version <= 4.3
AristaEos Version >= 4.9.0 < 4.9.12
AristaEos Version >= 4.10.0 < 4.10.9
AristaEos Version >= 4.11.0 < 4.11.11
AristaEos Version >= 4.12.0 < 4.12.9
AristaEos Version >= 4.13.0 < 4.13.9
AristaEos Version >= 4.14.0 < 4.14.4f
OracleLinux Version4
OracleLinux Version5 Update-
OracleLinux Version6 Update-
QnapQts Version < 4.1.1
QnapQts Version4.1.1 Update-
QnapQts Version4.1.1 Updatebuild_0927
MageiaMageia Version3.0
MageiaMageia Version4.0
RedhatVirtualization Version3.4
RedhatEnterprise Linux Version4.0
RedhatEnterprise Linux Version5.0
RedhatEnterprise Linux Version6.0
RedhatEnterprise Linux Version7.0
RedhatEnterprise Linux Eus Version5.9
RedhatEnterprise Linux Eus Version6.4
RedhatEnterprise Linux Eus Version6.5
RedhatEnterprise Linux Eus Version7.3
RedhatEnterprise Linux Eus Version7.4
RedhatEnterprise Linux Eus Version7.5
RedhatEnterprise Linux Eus Version7.6
RedhatEnterprise Linux Eus Version7.7
SuseStudio Onsite Version1.3
OpensuseOpensuse Version12.3
OpensuseOpensuse Version13.1
OpensuseOpensuse Version13.2
SuseLinux Enterprise Desktop Version11 Updatesp3
SuseLinux Enterprise Desktop Version12 Update-
SuseLinux Enterprise Server Version10 Updatesp3 SwEditionltss
SuseLinux Enterprise Server Version10 Updatesp4 SwEditionltss
SuseLinux Enterprise Server Version11 Updatesp1 SwEditionltss SwPlatform-
SuseLinux Enterprise Server Version11 Updatesp2 SwEditionltss
SuseLinux Enterprise Server Version11 Updatesp3 SwPlatform-
SuseLinux Enterprise Server Version11 Updatesp3 SwPlatformvmware
SuseLinux Enterprise Server Version12 Update-
DebianDebian Linux Version7.0
IbmPureapplication System Version >= 1.0.0.0 <= 1.0.0.4
IbmPureapplication System Version >= 1.1.0.0 <= 1.1.0.4
IbmPureapplication System Version2.0.0.0
IbmQradar Risk Manager Version7.1.0
IbmQradar Vulnerability Manager Version7.2.6 Updatep1
IbmQradar Vulnerability Manager Version7.2.6 Updatep2
IbmQradar Vulnerability Manager Version7.2.6 Updatep3
IbmQradar Vulnerability Manager Version7.2.6 Updatep4
IbmQradar Vulnerability Manager Version7.2.6 Updatep5
IbmQradar Vulnerability Manager Version7.2.6 Updatep6
IbmQradar Vulnerability Manager Version7.2.6 Updatep7
IbmQradar Vulnerability Manager Version7.2.8 Update-
IbmQradar Vulnerability Manager Version7.2.8 Updatep1
IbmQradar Vulnerability Manager Version7.2.8 Updatep10
IbmQradar Vulnerability Manager Version7.2.8 Updatep11
IbmQradar Vulnerability Manager Version7.2.8 Updatep12
IbmQradar Vulnerability Manager Version7.2.8 Updatep13
IbmQradar Vulnerability Manager Version7.2.8 Updatep14
IbmQradar Vulnerability Manager Version7.2.8 Updatep15
IbmQradar Vulnerability Manager Version7.2.8 Updatep16
IbmQradar Vulnerability Manager Version7.2.8 Updatep17
IbmQradar Vulnerability Manager Version7.2.8 Updatep2
IbmQradar Vulnerability Manager Version7.2.8 Updatep3
IbmQradar Vulnerability Manager Version7.2.8 Updatep4
IbmQradar Vulnerability Manager Version7.2.8 Updatep5
IbmQradar Vulnerability Manager Version7.2.8 Updatep6
IbmQradar Vulnerability Manager Version7.2.8 Updatep7
IbmQradar Vulnerability Manager Version7.2.8 Updatep8
IbmQradar Vulnerability Manager Version7.2.8 Updatep9
IbmSmartcloud Entry Appliance Version2.3.0
IbmSmartcloud Entry Appliance Version2.4.0
IbmSmartcloud Entry Appliance Version3.1.0
IbmSmartcloud Entry Appliance Version3.2.0
IbmSmartcloud Provisioning Version2.1.0
IbmSoftware Defined Network For Virtual Environments SwEditionkvm Version < 1.2.1
IbmSoftware Defined Network For Virtual Environments SwEditionopenflow Version < 1.2.1
IbmSoftware Defined Network For Virtual Environments SwEditionvmware Version < 1.2.1
IbmStarter Kit For Cloud Version2.2.0
IbmWorkload Deployer Version >= 3.1.0 <= 3.1.0.7
IbmStorwize V7000 Firmware Version >= 1.1.0.0 < 1.4.3.5
   IbmStorwize V7000 Version-
IbmStorwize V7000 Firmware Version >= 1.5.0.0 < 1.5.0.4
   IbmStorwize V7000 Version-
IbmStorwize V7000 Firmware Version >= 7.2.0.0 < 7.2.0.9
   IbmStorwize V7000 Version-
IbmStorwize V7000 Firmware Version >= 7.3.0.0 < 7.3.0.7
   IbmStorwize V7000 Version-
IbmStorwize V5000 Firmware Version >= 1.1.0.0 < 7.1.0.11
   IbmStorwize V5000 Version-
IbmStorwize V5000 Firmware Version >= 7.2.0.0 < 7.2.0.9
   IbmStorwize V5000 Version-
IbmStorwize V5000 Firmware Version >= 7.3.0.0 < 7.3.0.7
   IbmStorwize V5000 Version-
IbmStorwize V3700 Firmware Version >= 1.1.0.0 < 7.1.0.11
   IbmStorwize V3700 Version-
IbmStorwize V3700 Firmware Version >= 7.2.0.0 < 7.2.0.9
   IbmStorwize V3700 Version-
IbmStorwize V3700 Firmware Version >= 7.3.0.0 < 7.3.0.7
   IbmStorwize V3700 Version-
IbmStorwize V3500 Firmware Version >= 1.1.0.0 < 7.1.0.11
   IbmStorwize V3500 Version-
IbmStorwize V3500 Firmware Version >= 7.2.0.0 < 7.2.0.9
   IbmStorwize V3500 Version-
IbmStorwize V3500 Firmware Version >= 7.3.0.0 < 7.3.0.7
   IbmStorwize V3500 Version-
IbmFlex System V7000 Firmware Version >= 1.1.0.0 < 7.1.0.11
   IbmFlex System V7000 Version-
IbmFlex System V7000 Firmware Version >= 7.2.0.0 < 7.2.0.9
   IbmFlex System V7000 Version-
IbmFlex System V7000 Firmware Version >= 7.3.0.0 < 7.3.0.7
   IbmFlex System V7000 Version-
IbmSan Volume Controller Firmware Version >= 1.1.0.0 < 7.1.0.11
   IbmSan Volume Controller Version-
IbmSan Volume Controller Firmware Version >= 7.2.0.0 < 7.2.0.9
   IbmSan Volume Controller Version-
IbmSan Volume Controller Firmware Version >= 7.3.0.0 < 7.3.0.7
   IbmSan Volume Controller Version-
IbmStn6500 Firmware Version >= 3.8.0.0 < 3.8.0.07
   IbmStn6500 Version-
IbmStn6500 Firmware Version >= 3.9.1.0 < 3.9.1.08
   IbmStn6500 Version-
IbmStn6500 Firmware Version >= 4.1.2.0 < 4.1.2.06
   IbmStn6500 Version-
IbmStn6800 Firmware Version >= 3.8.0.0 < 3.8.0.07
   IbmStn6800 Version-
IbmStn6800 Firmware Version >= 3.9.1.0 < 3.9.1.08
   IbmStn6800 Version-
IbmStn6800 Firmware Version >= 4.1.2.0 < 4.1.2.06
   IbmStn6800 Version-
IbmStn7800 Firmware Version >= 3.8.0.0 < 3.8.0.07
   IbmStn7800 Version-
IbmStn7800 Firmware Version >= 3.9.1.0 < 3.9.1.08
   IbmStn7800 Version-
IbmStn7800 Firmware Version >= 4.1.2.0 < 4.1.2.06
   IbmStn7800 Version-
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version14.04 SwEditionesm
NovellOpen Enterprise Server Version2.0 Updatesp3 SwPlatformlinux_kernel
NovellOpen Enterprise Server Version11.0 Updatesp2 SwPlatformlinux_kernel
CheckpointSecurity Gateway Version < r77.30
F5Big-ip Access Policy Manager Version >= 10.1.0 <= 10.2.4
F5Big-ip Access Policy Manager Version >= 11.0.0 <= 11.5.1
F5Big-ip Access Policy Manager Version11.6.0
F5Big-ip Advanced Firewall Manager Version >= 11.3.0 <= 11.5.1
F5Big-ip Analytics Version >= 11.0.0 <= 11.5.1
F5Big-ip Analytics Version11.6.0
F5Big-ip Application Acceleration Manager Version >= 11.4.0 <= 11.5.1
F5Big-ip Application Security Manager Version >= 10.0.0 <= 10.2.4
F5Big-ip Application Security Manager Version >= 11.0.0 <= 11.5.1
F5Big-ip Edge Gateway Version >= 10.1.0 <= 10.2.4
F5Big-ip Edge Gateway Version >= 11.0.0 <= 11.3.0
F5Big-ip Global Traffic Manager Version >= 10.0.0 <= 10.2.4
F5Big-ip Global Traffic Manager Version >= 11.0.0 <= 11.5.1
F5Big-ip Global Traffic Manager Version11.6.0
F5Big-ip Link Controller Version >= 10.0.0 <= 10.2.4
F5Big-ip Link Controller Version >= 11.0.0 <= 11.5.1
F5Big-ip Link Controller Version11.6.0
F5Big-ip Local Traffic Manager Version >= 10.0.0 <= 10.2.4
F5Big-ip Local Traffic Manager Version >= 11.0.0 <= 11.5.1
F5Big-ip Local Traffic Manager Version11.6.0
F5Big-ip Policy Enforcement Manager Version >= 11.3.0 <= 11.5.1
F5Big-ip Protocol Security Module Version >= 10.0.0 <= 10.2.4
F5Big-ip Protocol Security Module Version >= 11.0.0 <= 11.4.1
F5Big-ip Wan Optimization Manager Version >= 10.0.0 <= 10.2.4
F5Big-ip Wan Optimization Manager Version >= 11.0.0 <= 11.3.0
F5Big-ip Webaccelerator Version >= 10.0.0 <= 10.2.4
F5Big-ip Webaccelerator Version >= 11.0.0 <= 11.3.0
F5Big-iq Cloud Version >= 4.0.0 <= 4.4.0
F5Big-iq Device Version >= 4.2.0 <= 4.4.0
F5Big-iq Security Version >= 4.0.0 <= 4.4.0
F5Enterprise Manager Version >= 2.1.0 <= 2.3.0
F5Enterprise Manager Version >= 3.0.0 <= 3.1.1
F5Traffix Signaling Delivery Controller Version >= 4.0.0 <= 4.0.5
F5Arx Firmware Version >= 6.0.0 <= 6.4.0
   F5Arx Version-
CitrixNetscaler Sdx Firmware Version < 9.3.67.5r1
   CitrixNetscaler Sdx Version-
CitrixNetscaler Sdx Firmware Version >= 10 < 10.1.129.11r1
   CitrixNetscaler Sdx Version-
CitrixNetscaler Sdx Firmware Version >= 10.5 < 10.5.52.11r1
   CitrixNetscaler Sdx Version-
ApplemacOS X Version >= 10.0.0 < 10.10.0
VMwareVcenter Server Appliance Version5.0 Updateupdate_1
VMwareVcenter Server Appliance Version5.0 Updateupdate_2
VMwareVcenter Server Appliance Version5.1 Updateupdate_1
VMwareVcenter Server Appliance Version5.1 Updateupdate_2
VMwareVcenter Server Appliance Version5.5 Update-
VMwareVcenter Server Appliance Version5.5 Updateupdate_1
VMwareEsx Version4.0
VMwareEsx Version4.1

28.01.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability

Schwachstelle

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.22% 0.999
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

http://marc.info/?l=bugtraq&m=141383465822787&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=142546741516006&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=142805027510172&w=2
Third Party Advisory
Mailing List
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Third Party Advisory
Vendor Advisory
VDB Entry
http://marc.info/?l=bugtraq&m=141216207813411&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141216668515282&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141235957116749&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141319209015420&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141330425327438&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141330468527613&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141345648114150&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141383026420882&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141383081521087&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141383138121313&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141383196021590&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141383244821813&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141383304022067&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141383353622268&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141450491804793&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141576728022234&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141577137423233&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141577241923505&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141577297623641&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141585637922673&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141694386919794&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141879528318582&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=142113462216480&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=142358026505815&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=142358078406056&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=142719845423222&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=142721162228379&w=2
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2014/Oct/0
Third Party Advisory
Mailing List
http://secunia.com/advisories/58200
Third Party Advisory
Broken Link
http://secunia.com/advisories/59272
Third Party Advisory
Broken Link
http://secunia.com/advisories/59737
Third Party Advisory
Broken Link
http://secunia.com/advisories/59907
Third Party Advisory
Broken Link
http://secunia.com/advisories/60024
Third Party Advisory
Broken Link
http://secunia.com/advisories/60034
Third Party Advisory
Broken Link
http://secunia.com/advisories/60044
Third Party Advisory
Broken Link
http://secunia.com/advisories/60055
Third Party Advisory
Broken Link
http://secunia.com/advisories/60063
Third Party Advisory
Broken Link
http://secunia.com/advisories/60193
Third Party Advisory
Broken Link
http://secunia.com/advisories/60325
Third Party Advisory
Broken Link
http://secunia.com/advisories/60433
Third Party Advisory
Broken Link
http://secunia.com/advisories/60947
Third Party Advisory
Broken Link
http://secunia.com/advisories/61065
Third Party Advisory
Broken Link
http://secunia.com/advisories/61128
Third Party Advisory
Broken Link
http://secunia.com/advisories/61129
Third Party Advisory
Broken Link
http://secunia.com/advisories/61188
Third Party Advisory
Broken Link
http://secunia.com/advisories/61283
Third Party Advisory
Broken Link
http://secunia.com/advisories/61287
Third Party Advisory
Broken Link
http://secunia.com/advisories/61291
Third Party Advisory
Broken Link
http://secunia.com/advisories/61312
Third Party Advisory
Broken Link
http://secunia.com/advisories/61313
Third Party Advisory
Broken Link
http://secunia.com/advisories/61328
Third Party Advisory
Broken Link
http://secunia.com/advisories/61442
Third Party Advisory
Broken Link
http://secunia.com/advisories/61471
Third Party Advisory
Broken Link
http://secunia.com/advisories/61485
Third Party Advisory
Broken Link
http://secunia.com/advisories/61503
Third Party Advisory
Broken Link
http://secunia.com/advisories/61542
Third Party Advisory
Broken Link
http://secunia.com/advisories/61547
Third Party Advisory
Broken Link
http://secunia.com/advisories/61550
Third Party Advisory
Broken Link
http://secunia.com/advisories/61552
Third Party Advisory
Broken Link
http://secunia.com/advisories/61565
Third Party Advisory
Broken Link
http://secunia.com/advisories/61603
Third Party Advisory
Broken Link
http://secunia.com/advisories/61633
Third Party Advisory
Broken Link
http://secunia.com/advisories/61641
Third Party Advisory
Broken Link
http://secunia.com/advisories/61643
Third Party Advisory
Broken Link
http://secunia.com/advisories/61654
Third Party Advisory
Broken Link
http://secunia.com/advisories/61676
Third Party Advisory
Broken Link
http://secunia.com/advisories/61700
Third Party Advisory
Broken Link
http://secunia.com/advisories/61703
Third Party Advisory
Broken Link
http://secunia.com/advisories/61711
Third Party Advisory
Broken Link
http://secunia.com/advisories/61715
Third Party Advisory
Broken Link
http://secunia.com/advisories/61780
Third Party Advisory
Broken Link
http://secunia.com/advisories/61816
Third Party Advisory
Broken Link
http://secunia.com/advisories/61855
Third Party Advisory
Broken Link
http://secunia.com/advisories/61857
Third Party Advisory
Broken Link
http://secunia.com/advisories/61873
Third Party Advisory
Broken Link
http://secunia.com/advisories/62228
Third Party Advisory
Broken Link
http://secunia.com/advisories/62312
Third Party Advisory
Broken Link
http://secunia.com/advisories/62343
Third Party Advisory
Broken Link
http://www.debian.org/security/2014/dsa-3032
Third Party Advisory
Mailing List
http://www.kb.cert.org/vuls/id/252743
Third Party Advisory
US Government Resource
http://www.securityfocus.com/archive/1/533593/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/70103
Third Party Advisory
Broken Link
VDB Entry
http://www.us-cert.gov/ncas/alerts/TA14-268A
Third Party Advisory
US Government Resource
https://access.redhat.com/articles/1200223
Third Party Advisory
Exploit
https://access.redhat.com/node/1200223
Third Party Advisory
Exploit
https://kb.bluecoat.com/index?page=content&id=SA82
Third Party Advisory
Broken Link
https://www.exploit-db.com/exploits/34879/
Third Party Advisory
Exploit
VDB Entry
https://www.exploit-db.com/exploits/37816/
Third Party Advisory
Exploit
VDB Entry
https://www.exploit-db.com/exploits/38849/
Third Party Advisory
Exploit
VDB Entry
https://www.exploit-db.com/exploits/39918/
Third Party Advisory
Exploit
VDB Entry
https://www.exploit-db.com/exploits/40619/
Third Party Advisory
Exploit
VDB Entry
https://www.exploit-db.com/exploits/40938/
Third Party Advisory
Exploit
VDB Entry
https://www.exploit-db.com/exploits/42938/
Third Party Advisory
Exploit
VDB Entry