Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-6271

Опубликовано: 24 сент. 2014
Источник: redhat
CVSS2: 7.5

Описание

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 3bashAffected
Red Hat Enterprise Linux 4 Extended Lifecycle SupportbashFixedRHSA-2014:129424.09.2014
Red Hat Enterprise Linux 5bashFixedRHSA-2014:129324.09.2014
Red Hat Enterprise Linux 5.6 Long LifebashFixedRHSA-2014:129424.09.2014
Red Hat Enterprise Linux 5.9 Extended Update SupportbashFixedRHSA-2014:129424.09.2014
Red Hat Enterprise Linux 6bashFixedRHSA-2014:129324.09.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportbashFixedRHSA-2014:129424.09.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportbashFixedRHSA-2014:129424.09.2014
Red Hat Enterprise Linux 7bashFixedRHSA-2014:129324.09.2014
RHEV Manager version 3.4rhev-hypervisor6FixedRHSA-2014:135402.10.2014

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1141597bash: specially-crafted environment variables can be used to inject shell commands

7.5 High

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 10 лет назад

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

CVSS3: 9.8
nvd
больше 10 лет назад

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

CVSS3: 9.8
debian
больше 10 лет назад

GNU Bash through 4.3 processes trailing strings after function definit ...

CVSS3: 9.8
github
около 3 лет назад

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

oracle-oval
больше 10 лет назад

ELSA-2014-1293: bash security update (CRITICAL)

7.5 High

CVSS2