Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-7169

Опубликовано: 24 сент. 2014
Источник: redhat
CVSS2: 5.1
EPSS Высокий

Описание

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 3bashAffected
Red Hat Enterprise Linux Extended Update Support 5.6bashAffected
Red Hat Enterprise Linux 4 Extended Lifecycle SupportbashFixedRHSA-2014:131126.09.2014
Red Hat Enterprise Linux 5bashFixedRHSA-2014:130626.09.2014
Red Hat Enterprise Linux 5.6 Long LifebashFixedRHSA-2014:131126.09.2014
Red Hat Enterprise Linux 5.9 Extended Update SupportbashFixedRHSA-2014:131126.09.2014
Red Hat Enterprise Linux 6bashFixedRHSA-2014:130626.09.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportbashFixedRHSA-2014:131126.09.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportbashFixedRHSA-2014:131126.09.2014
Red Hat Enterprise Linux 7bashFixedRHSA-2014:130626.09.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-228
https://bugzilla.redhat.com/show_bug.cgi?id=1146319bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)

EPSS

Процентиль: 99%
0.88955
Высокий

5.1 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 10 лет назад

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

CVSS3: 9.8
nvd
больше 10 лет назад

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

CVSS3: 9.8
debian
больше 10 лет назад

GNU Bash through 4.3 bash43-025 processes trailing strings after certa ...

CVSS3: 9.8
github
около 3 лет назад

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

oracle-oval
больше 10 лет назад

ELSA-2014-3077: bash security update (CRITICAL)

EPSS

Процентиль: 99%
0.88955
Высокий

5.1 Medium

CVSS2