National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2014-6278 Detail

Description

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.

Source:  MITRE      Last Modified:  09/30/2014

Quick Info

CVE Dictionary Entry:
CVE-2014-6278
Original release date:
09/30/2014
Last revised:
09/07/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
10.0 HIGH
Vector:
(AV:N/AC:L/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://jvn.jp/en/jp/JVN55667175/index.html External Source JVN JVN#55667175
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126 External Source JVNDB JVNDB-2014-000126
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html Patch External Source MISC http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html External Source MISC http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
http://linux.oracle.com/errata/ELSA-2014-3093 External Source CONFIRM http://linux.oracle.com/errata/ELSA-2014-3093
http://linux.oracle.com/errata/ELSA-2014-3094 External Source CONFIRM http://linux.oracle.com/errata/ELSA-2014-3094
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html External Source SUSE SUSE-SU-2014:1287
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html External Source SUSE openSUSE-SU-2014:1310
http://marc.info/?l=bugtraq&m=141330468527613&w=2 External Source HP HPSBGN03138
http://marc.info/?l=bugtraq&m=141345648114150&w=2 External Source HP HPSBHF03125
http://marc.info/?l=bugtraq&m=141383026420882&w=2 External Source HP HPSBMU03143
http://marc.info/?l=bugtraq&m=141383081521087&w=2 External Source HP HPSBMU03144
http://marc.info/?l=bugtraq&m=141383196021590&w=2 External Source HP HPSBST03129
http://marc.info/?l=bugtraq&m=141383244821813&w=2 External Source HP HPSBGN03142
http://marc.info/?l=bugtraq&m=141383304022067&w=2 External Source HP HPSBGN03141
http://marc.info/?l=bugtraq&m=141383353622268&w=2 External Source HP HPSBHF03146
http://marc.info/?l=bugtraq&m=141383465822787&w=2 External Source HP HPSBHF03145
http://marc.info/?l=bugtraq&m=141450491804793&w=2 External Source HP HPSBST03157
http://marc.info/?l=bugtraq&m=141576728022234&w=2 External Source HP HPSBST03155
http://marc.info/?l=bugtraq&m=141577137423233&w=2 External Source HP HPSBMU03165
http://marc.info/?l=bugtraq&m=141577241923505&w=2 External Source HP HPSBST03181
http://marc.info/?l=bugtraq&m=141577297623641&w=2 External Source HP HPSBST03154
http://marc.info/?l=bugtraq&m=141585637922673&w=2 External Source HP HPSBMU03182
http://marc.info/?l=bugtraq&m=141879528318582&w=2 External Source HP SSRT101827
http://marc.info/?l=bugtraq&m=142118135300698&w=2 External Source HP SSRT101868
http://marc.info/?l=bugtraq&m=142358026505815&w=2 External Source HP SSRT101742
http://marc.info/?l=bugtraq&m=142358078406056&w=2 External Source HP HPSBMU03246
http://marc.info/?l=bugtraq&m=142721162228379&w=2 External Source HP SSRT101819
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html External Source MISC http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html External Source MISC http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html
http://support.novell.com/security/cve/CVE-2014-6278.html External Source CONFIRM http://support.novell.com/security/cve/CVE-2014-6278.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash External Source CISCO 20140926 GNU Bash Environment Variable Command Injection Vulnerability
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 External Source MANDRIVA MDVSA-2015:164
http://www.novell.com/support/kb/doc.php?id=7015721 External Source CONFIRM http://www.novell.com/support/kb/doc.php?id=7015721
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html External Source CONFIRM http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
http://www.qnap.com/i/en/support/con_show.php?cid=61 External Source CONFIRM http://www.qnap.com/i/en/support/con_show.php?cid=61
http://www.ubuntu.com/usn/USN-2380-1 External Source UBUNTU USN-2380-1
http://www.vmware.com/security/advisories/VMSA-2014-0010.html External Source CONFIRM http://www.vmware.com/security/advisories/VMSA-2014-0010.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
http://www-01.ibm.com/support/docview.wss?uid=swg21685541 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685541
http://www-01.ibm.com/support/docview.wss?uid=swg21685604 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685604
http://www-01.ibm.com/support/docview.wss?uid=swg21685733 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685733
http://www-01.ibm.com/support/docview.wss?uid=swg21685749 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685749
http://www-01.ibm.com/support/docview.wss?uid=swg21685914 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21685914
http://www-01.ibm.com/support/docview.wss?uid=swg21686131 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686131
http://www-01.ibm.com/support/docview.wss?uid=swg21686246 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686246
http://www-01.ibm.com/support/docview.wss?uid=swg21686445 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686445
http://www-01.ibm.com/support/docview.wss?uid=swg21686479 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686479
http://www-01.ibm.com/support/docview.wss?uid=swg21686494 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686494
http://www-01.ibm.com/support/docview.wss?uid=swg21687079 External Source CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21687079
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 External Source CONFIRM http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
https://bugzilla.redhat.com/show_bug.cgi?id=1147414 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1147414
https://kb.bluecoat.com/index?page=content&id=SA82 External Source CONFIRM https://kb.bluecoat.com/index?page=content&id=SA82
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648 External Source CONFIRM https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
https://kc.mcafee.com/corporate/index?page=content&id=SB10085 External Source CONFIRM https://kc.mcafee.com/corporate/index?page=content&id=SB10085
https://security-tracker.debian.org/tracker/CVE-2014-6278 External Source CONFIRM https://security-tracker.debian.org/tracker/CVE-2014-6278
https://support.citrix.com/article/CTX200217 External Source CONFIRM https://support.citrix.com/article/CTX200217
https://support.citrix.com/article/CTX200223 External Source CONFIRM https://support.citrix.com/article/CTX200223
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html External Source CONFIRM https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts External Source CONFIRM https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
https://www.exploit-db.com/exploits/39568/ External Source EXPLOIT-DB 39568
https://www.exploit-db.com/exploits/39887/ External Source EXPLOIT-DB 39887
https://www.suse.com/support/shellshock/ External Source CONFIRM https://www.suse.com/support/shellshock/

Technical Details

Vulnerability Type (View All)

  • OS Command Injections (CWE-78)

Change History 12 change records found - show changes