10

CVE-2014-6277

Exploit

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

Data is provided by the National Vulnerability Database (NVD)
GnuBash Version1.14.0
GnuBash Version1.14.1
GnuBash Version1.14.2
GnuBash Version1.14.3
GnuBash Version1.14.4
GnuBash Version1.14.5
GnuBash Version1.14.6
GnuBash Version1.14.7
GnuBash Version2.0
GnuBash Version2.01
GnuBash Version2.01.1
GnuBash Version2.02
GnuBash Version2.02.1
GnuBash Version2.03
GnuBash Version2.04
GnuBash Version2.05
GnuBash Version2.05 Updatea
GnuBash Version2.05 Updateb
GnuBash Version3.0
GnuBash Version3.0.16
GnuBash Version3.1
GnuBash Version3.2
GnuBash Version3.2.48
GnuBash Version4.0
GnuBash Version4.0 Updaterc1
GnuBash Version4.1
GnuBash Version4.2
GnuBash Version4.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 85.13% 0.993
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.