Mission and Overview
NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA).
Resource Status
NVD contains:

Last updated: 10/22/2016 8:45:55 AM

CVE Publication rate: 20.53

Email List

NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists

Workload Index
Vulnerability Workload Index: 11.44
About Us
NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security's National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the Security Content Automation Protocol (SCAP).

National Cyber Awareness System

Vulnerability Summary for CVE-2014-6271

Original release date: 09/24/2014
Last revised: 06/28/2016
Source: US-CERT/NIST

Overview

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score: 10.0 HIGH
Impact Subscore: 10.0
Exploitability Subscore: 10.0
CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Low
Authentication: Not required to exploit
Impact Type: Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

External Source: HP
Name: HPSBHF03145
External Source: BUGTRAQ
Name: 20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
External Source: MISC
Name: http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
External Source: HP
Name: HPSBMU03165
External Source: HP
Name: HPSBST03148
External Source: HP
Name: HPSBMU03144
External Source: HP
Name: SSRT101742
External Source: REDHAT
Name: RHSA-2014:1293
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
External Source: EXPLOIT-DB
Name: 39918
Type: Exploit
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
External Source: SUSE
Name: openSUSE-SU-2014:1238
External Source: CONFIRM
Name: https://kb.bluecoat.com/index?page=content&id=SA82
External Source: REDHAT
Name: RHSA-2014:1294
External Source: HP
Name: HPSBST03122
External Source: HP
Name: HPSBST03154
External Source: HP
Name: HPSBMU03182
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
External Source: HP
Name: HPSBHF03125
External Source: HP
Name: HPSBGN03141
External Source: CONFIRM
Name: https://access.redhat.com/articles/1200223
External Source: DEBIAN
Name: DSA-3032
External Source: HP
Name: HPSBST03129
External Source: SUSE
Name: openSUSE-SU-2014:1226
External Source: HP
Name: SSRT101711
External Source: CONFIRM
Name: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
External Source: CONFIRM
Name: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
External Source: CERT
Name: TA14-268A
Type: US Government Resource
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
External Source: APPLE
Name: APPLE-SA-2014-10-16-1
External Source: SUSE
Name: SUSE-SU-2014:1223
External Source: HP
Name: HPSBHF03119
External Source: FULLDISC
Name: 20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities
External Source: CONFIRM
Name: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
External Source: HP
Name: HPSBMU03133
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
External Source: REDHAT
Name: RHSA-2014:1295
External Source: CONFIRM
Name: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
External Source: CISCO
Name: 20140926 GNU Bash Environmental Variable Command Injection Vulnerability
External Source: CONFIRM
Name: http://www.novell.com/support/kb/doc.php?id=7015701
External Source: SUSE
Name: SUSE-SU-2014:1260
External Source: CONFIRM
Name: https://www.suse.com/support/shellshock/
External Source: REDHAT
Name: RHSA-2014:1354
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
External Source: HP
Name: SSRT101819
External Source: SUSE
Name: SUSE-SU-2014:1287
External Source: HP
Name: HPSBHF03124
External Source: CONFIRM
Name: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
External Source: HP
Name: HPSBGN03142
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
External Source: HP
Name: HPSBHF03146
External Source: CONFIRM
Name: http://support.novell.com/security/cve/CVE-2014-6271.html
External Source: SUSE
Name: openSUSE-SU-2014:1254
External Source: MISC
Name: http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html
Type: Exploit
External Source: MISC
Name: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
External Source: HP
Name: HPSBST03181
External Source: MISC
Name: http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
External Source: MISC
Name: http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html
External Source: CONFIRM
Name: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
External Source: MANDRIVA
Name: MDVSA-2015:164
External Source: JVN
Name: JVN#55667175
Type: Vendor Advisory
External Source: HP
Name: HPSBMU03143
External Source: HP
Name: HPSBST03157
External Source: JVNDB
Name: JVNDB-2014-000126
Type: Vendor Advisory
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
External Source: HP
Name: HPSBST03265
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
External Source: HP
Name: HPSBST03155
External Source: SUSE
Name: openSUSE-SU-2014:1308
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21686447
External Source: CONFIRM
Name: https://support.citrix.com/article/CTX200223
External Source: CONFIRM
Name: http://advisories.mageia.org/MGASA-2014-0388.html
External Source: HP
Name: SSRT101816
External Source: CONFIRM
Name: https://support.citrix.com/article/CTX200217
External Source: UBUNTU
Name: USN-2362-1
External Source: HP
Name: HPSBGN03138
External Source: HP
Name: HPSBST03131
External Source: CONFIRM
Name: https://support.apple.com/kb/HT6535
External Source: SUSE
Name: SUSE-SU-2014:1212
External Source: CONFIRM
Name: http://www.novell.com/support/kb/doc.php?id=7015721
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
External Source: HP
Name: SSRT101868
External Source: HP
Name: HPSBMU03246
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21686084
External Source: CERT-VN
Name: VU#252743
Type: US Government Resource
External Source: SUSE
Name: SUSE-SU-2014:1213
External Source: CONFIRM
Name: http://www.qnap.com/i/en/support/con_show.php?cid=61
External Source: CONFIRM
Name: http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
External Source: HP
Name: SSRT101827
External Source: CONFIRM
Name: https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
Type: Exploit
External Source: SUSE
Name: openSUSE-SU-2014:1310
External Source: CONFIRM
Name: https://bugzilla.redhat.com/show_bug.cgi?id=1141597
Type: Patch
External Source: CONFIRM
Name: http://support.apple.com/kb/HT6495
External Source: HP
Name: HPSBST03195
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
External Source: HP
Name: HPSBGN03117

Technical Details

Vulnerability Type (View All)
  • OS Command Injections (CWE-78)

Change History 14 change records found - show changes