National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2014-6271 Detail

Current Description

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

Source:  MITRE      Last Modified:  09/24/2014      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2014-6271
Original release date:
09/24/2014
Last revised:
10/04/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
10.0 HIGH
Vector:
(AV:N/AC:L/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://advisories.mageia.org/MGASA-2014-0388.html External Source CONFIRM http://advisories.mageia.org/MGASA-2014-0388.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html External Source APPLE APPLE-SA-2014-10-16-1
http://jvn.jp/en/jp/JVN55667175/index.html Vendor Advisory External Source JVN JVN#55667175
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126 Vendor Advisory External Source JVNDB JVNDB-2014-000126
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 External Source CONFIRM http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html External Source MISC http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
http://linux.oracle.com/errata/ELSA-2014-1293.html External Source CONFIRM http://linux.oracle.com/errata/ELSA-2014-1293.html
http://linux.oracle.com/errata/ELSA-2014-1294.html External Source CONFIRM http://linux.oracle.com/errata/ELSA-2014-1294.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html External Source SUSE SUSE-SU-2014:1212
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html External Source SUSE SUSE-SU-2014:1213
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html External Source SUSE SUSE-SU-2014:1223
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html External Source SUSE openSUSE-SU-2014:1226
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html External Source SUSE openSUSE-SU-2014:1238
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html External Source SUSE openSUSE-SU-2014:1254
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html External Source SUSE SUSE-SU-2014:1260
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html External Source SUSE SUSE-SU-2014:1287
http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html External Source SUSE openSUSE-SU-2014:1308
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html External Source SUSE openSUSE-SU-2014:1310
http://marc.info/?l=bugtraq&m=141216207813411&w=2 External Source HP HPSBGN03117
http://marc.info/?l=bugtraq&m=141216668515282&w=2 External Source HP HPSBHF03119
http://marc.info/?l=bugtraq&m=141235957116749&w=2 External Source HP HPSBHF03124
http://marc.info/?l=bugtraq&m=141319209015420&w=2 External Source HP HPSBST03122
http://marc.info/?l=bugtraq&m=141330425327438&w=2 External Source HP HPSBMU03133
http://marc.info/?l=bugtraq&m=141330468527613&w=2 External Source HP HPSBGN03138
http://marc.info/?l=bugtraq&m=141345648114150&w=2 External Source HP HPSBHF03125
http://marc.info/?l=bugtraq&m=141383026420882&w=2 External Source HP HPSBMU03143
http://marc.info/?l=bugtraq&m=141383081521087&w=2 External Source HP HPSBMU03144
http://marc.info/?l=bugtraq&m=141383138121313&w=2 External Source HP HPSBST03131
http://marc.info/?l=bugtraq&m=141383196021590&w=2 External Source HP HPSBST03129
http://marc.info/?l=bugtraq&m=141383244821813&w=2 External Source HP HPSBGN03142
http://marc.info/?l=bugtraq&m=141383304022067&w=2 External Source HP HPSBGN03141
http://marc.info/?l=bugtraq&m=141383353622268&w=2 External Source HP HPSBHF03146
http://marc.info/?l=bugtraq&m=141383465822787&w=2 External Source HP HPSBHF03145
http://marc.info/?l=bugtraq&m=141450491804793&w=2 External Source HP HPSBST03157
http://marc.info/?l=bugtraq&m=141576728022234&w=2 External Source HP HPSBST03155
http://marc.info/?l=bugtraq&m=141577137423233&w=2 External Source HP HPSBMU03165
http://marc.info/?l=bugtraq&m=141577241923505&w=2 External Source HP HPSBST03181
http://marc.info/?l=bugtraq&m=141577297623641&w=2 External Source HP HPSBST03154
http://marc.info/?l=bugtraq&m=141585637922673&w=2 External Source HP HPSBMU03182
http://marc.info/?l=bugtraq&m=141694386919794&w=2 External Source HP HPSBST03148
http://marc.info/?l=bugtraq&m=141879528318582&w=2 External Source HP SSRT101827
http://marc.info/?l=bugtraq&m=142113462216480&w=2 External Source HP SSRT101711
http://marc.info/?l=bugtraq&m=142118135300698&w=2 External Source HP SSRT101868
http://marc.info/?l=bugtraq&m=142358026505815&w=2 External Source HP SSRT101742
http://marc.info/?l=bugtraq&m=142358078406056&w=2 External Source HP HPSBMU03246
http://marc.info/?l=bugtraq&m=142546741516006&w=2 External Source HP HPSBST03265
http://marc.info/?l=bugtraq&m=142719845423222&w=2 External Source HP SSRT101816
http://marc.info/?l=bugtraq&m=142721162228379&w=2 External Source HP SSRT101819
http://marc.info/?l=bugtraq&m=142805027510172&w=2 External Source HP HPSBST03195
http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html External Source MISC http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html External Source MISC http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html External Source MISC http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html
http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html Exploit External Source MISC http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html
http://rhn.redhat.com/errata/RHSA-2014-1293.html External Source REDHAT RHSA-2014:1293
http://rhn.redhat.com/errata/RHSA-2014-1294.html External Source REDHAT RHSA-2014:1294
http://rhn.redhat.com/errata/RHSA-2014-1295.html External Source REDHAT RHSA-2014:1295
http://rhn.redhat.com/errata/RHSA-2014-1354.html External Source REDHAT RHSA-2014:1354
http://seclists.org/fulldisclosure/2014/Oct/0 External Source FULLDISC 20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities
http://secunia.com/advisories/59272 External Source SECUNIA 59272
http://secunia.com/advisories/61542 External Source SECUNIA 61542
http://secunia.com/advisories/61547 External Source SECUNIA 61547
http://secunia.com/advisories/62228 External Source SECUNIA 62228
http://support.apple.com/kb/HT6495 External Source CONFIRM http://support.apple.com/kb/HT6495
http://support.novell.com/security/cve/CVE-2014-6271.html External Source CONFIRM http://support.novell.com/security/cve/CVE-2014-6271.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash External Source CISCO 20140926 GNU Bash Environmental Variable Command Injection Vulnerability
http://www.debian.org/security/2014/dsa-3032 External Source DEBIAN DSA-3032
http://www.kb.cert.org/vuls/id/252743 US Government Resource External Source CERT-VN VU#252743
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 External Source MANDRIVA MDVSA-2015:164
http://www.novell.com/support/kb/doc.php?id=7015701 External Source CONFIRM http://www.novell.com/support/kb/doc.php?id=7015701
http://www.novell.com/support/kb/doc.php?id=7015721 External Source CONFIRM http://www.novell.com/support/kb/doc.php?id=7015721
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html External Source CONFIRM http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
http://www.qnap.com/i/en/support/con_show.php?cid=61 External Source CONFIRM http://www.qnap.com/i/en/support/con_show.php?cid=61
http://www.securityfocus.com/archive/1/archive/1/533593/100/0/threaded External Source BUGTRAQ 20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities
http://www.securityfocus.com/bid/70103 External Source BID 70103
http://www.ubuntu.com/usn/USN-2362-1 External Source UBUNTU USN-2362-1
http://www.us-cert.gov/ncas/alerts/TA14-268A US Government Resource External Source CERT TA14-268A
http://www.vmware.com/security/advisories/VMSA-2014-0010.html External Source CONFIRM http://www.vmware.com/security/advisories/VMSA-2014-0010.html
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 External Source CONFIRM http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
http://www-01.ibm.com/support/docview.wss?uid=swg21685541 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685541
http://www-01.ibm.com/support/docview.wss?uid=swg21685604 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685604
http://www-01.ibm.com/support/docview.wss?uid=swg21685733 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685733
http://www-01.ibm.com/support/docview.wss?uid=swg21685749 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685749
http://www-01.ibm.com/support/docview.wss?uid=swg21685914 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685914
http://www-01.ibm.com/support/docview.wss?uid=swg21686084 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686084
http://www-01.ibm.com/support/docview.wss?uid=swg21686131 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686131
http://www-01.ibm.com/support/docview.wss?uid=swg21686246 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686246
http://www-01.ibm.com/support/docview.wss?uid=swg21686445 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686445
http://www-01.ibm.com/support/docview.wss?uid=swg21686447 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686447
http://www-01.ibm.com/support/docview.wss?uid=swg21686479 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686479
http://www-01.ibm.com/support/docview.wss?uid=swg21686494 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686494
http://www-01.ibm.com/support/docview.wss?uid=swg21687079 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21687079
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 External Source CONFIRM http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
https://access.redhat.com/articles/1200223 External Source CONFIRM https://access.redhat.com/articles/1200223
https://access.redhat.com/node/1200223 External Source CONFIRM https://access.redhat.com/node/1200223
https://bugzilla.redhat.com/show_bug.cgi?id=1141597 Patch External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1141597
https://kb.bluecoat.com/index?page=content&id=SA82 External Source CONFIRM https://kb.bluecoat.com/index?page=content&id=SA82
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648 External Source CONFIRM https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
https://kc.mcafee.com/corporate/index?page=content&id=SB10085 External Source CONFIRM https://kc.mcafee.com/corporate/index?page=content&id=SB10085
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/ Exploit External Source CONFIRM https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
https://support.apple.com/kb/HT6535 External Source CONFIRM https://support.apple.com/kb/HT6535
https://support.citrix.com/article/CTX200217 External Source CONFIRM https://support.citrix.com/article/CTX200217
https://support.citrix.com/article/CTX200223 External Source CONFIRM https://support.citrix.com/article/CTX200223
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html External Source CONFIRM https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts External Source CONFIRM https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
https://www.exploit-db.com/exploits/34879/ External Source EXPLOIT-DB 34879
https://www.exploit-db.com/exploits/37816/ External Source EXPLOIT-DB 37816
https://www.exploit-db.com/exploits/38849/ External Source EXPLOIT-DB 38849
https://www.exploit-db.com/exploits/39918/ Exploit External Source EXPLOIT-DB 39918
https://www.exploit-db.com/exploits/40619/ External Source EXPLOIT-DB 40619
https://www.exploit-db.com/exploits/40938/ External Source EXPLOIT-DB 40938
https://www.exploit-db.com/exploits/42938/ External Source EXPLOIT-DB 42938
https://www.suse.com/support/shellshock/ External Source CONFIRM https://www.suse.com/support/shellshock/

Technical Details

Vulnerability Type (View All)

  • OS Command Injections (CWE-78)

Change History 23 change records found - show changes