GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
External Source:
SUSE
Name:
openSUSE-SU-2014:1229
External Source:
HP
Name:
HPSBST03181
External Source:
CONFIRM
Name:
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
External Source:
CONFIRM
Name:
http://support.novell.com/security/cve/CVE-2014-7169.html
External Source:
HP
Name:
HPSBHF03119
External Source:
MLIST
Name:
[oss-security] 20140924 Re: CVE-2014-6271: remote code execution through bash
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
External Source:
CONFIRM
Name:
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
External Source:
SUSE
Name:
SUSE-SU-2014:1259
External Source:
CONFIRM
Name:
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
External Source:
HP
Name:
HPSBST03195
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21685541
External Source:
CONFIRM
Name:
http://www.novell.com/support/kb/doc.php?id=7015721
External Source:
UBUNTU
Name:
USN-2363-2
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
External Source:
SUSE
Name:
SUSE-SU-2014:1247
External Source:
HP
Name:
HPSBMU03133
External Source:
CONFIRM
Name:
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
External Source:
CONFIRM
Name:
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
External Source:
CONFIRM
Name:
http://linux.oracle.com/errata/ELSA-2014-1306.html
External Source:
CISCO
Name:
20140926 GNU Bash Environmental Variable Command Injection Vulnerability
External Source:
CONFIRM
Name:
http://advisories.mageia.org/MGASA-2014-0393.html
External Source:
HP
Name:
HPSBMU03143
External Source:
SUSE
Name:
openSUSE-SU-2014:1242
External Source:
REDHAT
Name:
RHSA-2014:1354
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21686084
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
External Source:
HP
Name:
HPSBST03157
External Source:
MANDRIVA
Name:
MDVSA-2015:164
External Source:
SUSE
Name:
openSUSE-SU-2014:1308
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
External Source:
HP
Name:
SSRT101742
External Source:
CONFIRM
Name:
http://www.qnap.com/i/en/support/con_show.php?cid=61
External Source:
HP
Name:
HPSBST03122
External Source:
SUSE
Name:
SUSE-SU-2014:1287
External Source:
CONFIRM
Name:
https://access.redhat.com/articles/1200223
External Source:
HP
Name:
SSRT101711
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
External Source:
CONFIRM
Name:
https://kb.bluecoat.com/index?page=content&id=SA82
External Source:
HP
Name:
HPSBHF03124
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
External Source:
HP
Name:
HPSBGN03117
External Source:
CONFIRM
Name:
http://linux.oracle.com/errata/ELSA-2014-3075.html
External Source:
HP
Name:
HPSBMU03165
External Source:
CONFIRM
Name:
https://support.apple.com/kb/HT6535
External Source:
HP
Name:
SSRT101868
External Source:
FULLDISC
Name:
20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities
External Source:
CONFIRM
Name:
http://support.apple.com/kb/HT6495
External Source:
CONFIRM
Name:
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
External Source:
HP
Name:
HPSBST03154
External Source:
SECUNIA
Name:
62228
External Source:
JVNDB
Name:
JVNDB-2014-000126
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21686447
External Source:
SECUNIA
Name:
59272
External Source:
HP
Name:
HPSBST03131
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
External Source:
HP
Name:
HPSBGN03142
External Source:
HP
Name:
HPSBST03155
External Source:
CONFIRM
Name:
https://www.suse.com/support/shellshock/
External Source:
HP
Name:
HPSBGN03141
External Source:
SUSE
Name:
openSUSE-SU-2014:1310
External Source:
CONFIRM
Name:
https://support.citrix.com/article/CTX200223
External Source:
HP
Name:
HPSBHF03146
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
External Source:
HP
Name:
HPSBGN03138
External Source:
HP
Name:
SSRT101819
External Source:
UBUNTU
Name:
USN-2363-1
External Source:
CERT-VN
Name:
VU#252743
Type:
US Government Resource
External Source:
BUGTRAQ
Name:
20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities
External Source:
HP
Name:
HPSBMU03246
External Source:
HP
Name:
HPSBHF03145
External Source:
HP
Name:
HPSBMU03182
External Source:
SUSE
Name:
openSUSE-SU-2014:1254
External Source:
HP
Name:
HPSBST03129
External Source:
MISC
Name:
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
External Source:
APPLE
Name:
APPLE-SA-2014-10-16-1
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
External Source:
HP
Name:
HPSBHF03125
External Source:
HP
Name:
HPSBMU03144
External Source:
REDHAT
Name:
RHSA-2014:1311
External Source:
DEBIAN
Name:
DSA-3035
External Source:
CONFIRM
Name:
https://access.redhat.com/node/1200223
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
External Source:
MISC
Name:
http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
External Source:
CONFIRM
Name:
http://www.novell.com/support/kb/doc.php?id=7015701
External Source:
HP
Name:
SSRT101827
External Source:
JVN
Name:
JVN#55667175
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
External Source:
CERT
Name:
TA14-268A
Type:
US Government Resource
External Source:
CONFIRM
Name:
https://support.citrix.com/article/CTX200217
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
External Source:
MISC
Name:
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
External Source:
CONFIRM
Name:
http://linux.oracle.com/errata/ELSA-2014-3077.html
External Source:
CONFIRM
Name:
http://linux.oracle.com/errata/ELSA-2014-3078.html
External Source:
REDHAT
Name:
RHSA-2014:1312
External Source:
HP
Name:
HPSBST03148
External Source:
CONFIRM
Name:
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
External Source:
REDHAT
Name:
RHSA-2014:1306
External Source:
MISC
Name:
http://twitter.com/taviso/statuses/514887394294652929
External Source:
CONFIRM
Name:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts