TROYANOSYVIRUS
Retour aux CVEs

CVE-2014-6271

CRITICALCISA KEV
9.8

Description

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie9/24/2014
Derniere modification4/22/2026
Sourcekev
Observations honeypot0

CISA KEV

FournisseurGNU
ProduitBourne-Again Shell (Bash)
Nom vulnerabiliteGNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability
Date ajout KEV2022-01-28
Date limite remediation2022-07-28
Utilise dans ransomwareUnknown

Produits affectes

apple:mac_os_xarista:eoscanonical:ubuntu_linuxcheckpoint:security_gatewaycitrix:netscaler_sdxcitrix:netscaler_sdx_firmwaredebian:debian_linuxf5:arxf5:arx_firmwaref5:big-ip_access_policy_managerf5:big-ip_advanced_firewall_managerf5:big-ip_analyticsf5:big-ip_application_acceleration_managerf5:big-ip_application_security_managerf5:big-ip_edge_gatewayf5:big-ip_global_traffic_managerf5:big-ip_link_controllerf5:big-ip_local_traffic_managerf5:big-ip_policy_enforcement_managerf5:big-ip_protocol_security_modulef5:big-ip_wan_optimization_managerf5:big-ip_webacceleratorf5:big-iq_cloudf5:big-iq_devicef5:big-iq_securityf5:enterprise_managerf5:traffix_signaling_delivery_controllergnu:bashibm:flex_system_v7000ibm:flex_system_v7000_firmwareibm:infosphere_guardium_database_activity_monitoringibm:pureapplication_systemibm:qradar_risk_manageribm:qradar_security_information_and_event_manageribm:qradar_vulnerability_manageribm:san_volume_controlleribm:san_volume_controller_firmwareibm:security_access_manager_for_mobile_8.0_firmwareibm:security_access_manager_for_web_7.0_firmwareibm:security_access_manager_for_web_8.0_firmwareibm:smartcloud_entry_applianceibm:smartcloud_provisioningibm:software_defined_network_for_virtual_environmentsibm:starter_kit_for_cloudibm:stn6500ibm:stn6500_firmwareibm:stn6800ibm:stn6800_firmwareibm:stn7800ibm:stn7800_firmwareibm:storwize_v3500ibm:storwize_v3500_firmwareibm:storwize_v3700ibm:storwize_v3700_firmwareibm:storwize_v5000ibm:storwize_v5000_firmwareibm:storwize_v7000ibm:storwize_v7000_firmwareibm:workload_deployermageia:mageianovell:open_enterprise_servernovell:zenworks_configuration_managementopensuse:opensuseoracle:linuxqnap:qtsredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_power_big_endianredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_scientific_computingredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_from_rhuiredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:gluster_storage_server_for_on-premiseredhat:virtualizationsuse:linux_enterprise_desktopsuse:linux_enterprise_serversuse:linux_enterprise_software_development_kitsuse:studio_onsitevmware:esxvmware:vcenter_server_appliance

Faiblesses (CWE)

CWE-78CWE-78

References

http://advisories.mageia.org/MGASA-2014-0388.html(af854a3a-2127-422b-91ae-364da2661108)
http://jvn.jp/en/jp/JVN55667175/index.html(af854a3a-2127-422b-91ae-364da2661108)
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126(af854a3a-2127-422b-91ae-364da2661108)
http://linux.oracle.com/errata/ELSA-2014-1293.html(af854a3a-2127-422b-91ae-364da2661108)
http://linux.oracle.com/errata/ELSA-2014-1294.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141216207813411&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141216668515282&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141235957116749&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141319209015420&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141330425327438&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141330468527613&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141345648114150&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141383026420882&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141383081521087&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141383138121313&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141383196021590&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141383244821813&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141383304022067&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141383353622268&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141383465822787&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141450491804793&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141576728022234&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141577137423233&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141577241923505&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141577297623641&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141585637922673&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141694386919794&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141879528318582&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=142113462216480&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=142118135300698&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=142358026505815&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=142358078406056&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=142546741516006&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=142719845423222&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=142721162228379&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=142805027510172&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-1293.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-1294.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-1295.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-1354.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2014/Oct/0(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/58200(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59272(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59737(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59907(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60024(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60034(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60044(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60055(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60063(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60193(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60325(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60433(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60947(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61065(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61128(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61129(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61188(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61283(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61287(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61291(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61312(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61313(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61328(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61442(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61471(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61485(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61503(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61542(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61547(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61550(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61552(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61565(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61603(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61633(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61641(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61643(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61654(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61676(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61700(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61703(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61711(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61715(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61780(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61816(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61855(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61857(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61873(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/62228(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/62312(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/62343(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT6495(af854a3a-2127-422b-91ae-364da2661108)
http://support.novell.com/security/cve/CVE-2014-6271.html(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21685541(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21685604(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21685733(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21685749(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21685914(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21686084(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21686131(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21686246(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21686445(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21686447(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21686479(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21686494(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21687079(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-3032(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/252743(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/support/kb/doc.php?id=7015701(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/support/kb/doc.php?id=7015721(af854a3a-2127-422b-91ae-364da2661108)
http://www.qnap.com/i/en/support/con_show.php?cid=61(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/70103(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2362-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/ncas/alerts/TA14-268A(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/articles/1200223(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/node/1200223(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1141597(af854a3a-2127-422b-91ae-364da2661108)
https://kb.bluecoat.com/index?page=content&id=SA82(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT6535(af854a3a-2127-422b-91ae-364da2661108)
https://support.citrix.com/article/CTX200217(af854a3a-2127-422b-91ae-364da2661108)
https://support.citrix.com/article/CTX200223(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/34879/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/37816/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/38849/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/39918/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40619/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40938/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/42938/(af854a3a-2127-422b-91ae-364da2661108)
https://www.suse.com/support/shellshock/(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.