Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-7186

Опубликовано: 25 сент. 2014
Источник: redhat
CVSS2: 4.6
EPSS Критический

Описание

The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.

It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.

Отчет

A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 3bashAffected
Red Hat Enterprise Linux 6guest-imagesAffected
Red Hat Enterprise Linux 7rhel-guest-imageAffected
Red Hat Enterprise Linux Extended Update Support 5.6bashAffected
Red Hat Enterprise Linux 4 Extended Lifecycle SupportbashFixedRHSA-2014:131126.09.2014
Red Hat Enterprise Linux 5bashFixedRHSA-2014:130626.09.2014
Red Hat Enterprise Linux 5.6 Long LifebashFixedRHSA-2014:131126.09.2014
Red Hat Enterprise Linux 5.9 Extended Update SupportbashFixedRHSA-2014:131126.09.2014
Red Hat Enterprise Linux 6bashFixedRHSA-2014:130626.09.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportbashFixedRHSA-2014:131126.09.2014

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1146791bash: parser can allow out-of-bounds memory access while handling redir_stack

EPSS

Процентиль: 100%
0.90345
Критический

4.6 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.

nvd
больше 10 лет назад

The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.

debian
больше 10 лет назад

The redirection implementation in parse.y in GNU Bash through 4.3 bash ...

github
около 3 лет назад

The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.

fstec
больше 10 лет назад

Уязвимость интерпретатора командной строки GNU Bash, позволяющая злоумышленнику вызвать отказ в обслуживании либо выполнить произвольный код

EPSS

Процентиль: 100%
0.90345
Критический

4.6 Medium

CVSS2