Action not permitted
Modal body text goes here.
Modal Title
Modal Body
rhsa-2014_1354
Vulnerability from csaf_redhat
Published
2014-10-02 18:40
Modified
2024-12-15 18:38
Summary
Red Hat Security Advisory: rhev-hypervisor6 security update
Notes
Topic
An updated rhev-hypervisor6 package that fixes several security issues is
now available.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes
everything necessary to run and manage virtual machines: a subset of the
Red Hat Enterprise Linux operating environment and the Red Hat Enterprise
Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A flaw was found in the way Bash evaluated certain specially crafted
environment variables. An attacker could use this flaw to override or
bypass environment restrictions to execute shell commands. Certain services
and applications allow remote unauthenticated attackers to provide
environment variables, allowing them to exploit this issue. (CVE-2014-6271)
It was found that the fix for CVE-2014-6271 was incomplete, and Bash still
allowed certain characters to be injected into other environments via
specially crafted environment variables. An attacker could potentially use
this flaw to override or bypass environment restrictions to execute shell
commands. Certain services and applications allow remote unauthenticated
attackers to provide environment variables, allowing them to exploit this
issue. (CVE-2014-7169)
A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One)
input from certain RSA signatures. A remote attacker could use this flaw to
forge RSA certificates by providing a specially crafted signature to an
application using NSS. (CVE-2014-1568)
It was discovered that the fixed-sized redir_stack could be forced to
overflow in the Bash parser, resulting in memory corruption, and possibly
leading to arbitrary code execution when evaluating untrusted input that
would not otherwise be run as code. (CVE-2014-7186)
An off-by-one error was discovered in the way Bash was handling deeply
nested flow control constructs. Depending on the layout of the .bss
segment, this could allow arbitrary execution of code that would not
otherwise be executed by Bash. (CVE-2014-7187)
Red Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271,
and the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges
Antoine Delignat-Lavaud and Intel Product Security Incident Response Team
as the original reporters of CVE-2014-1568. The CVE-2014-7186 and
CVE-2014-7187 issues were discovered by Florian Weimer of Red Hat Product
Security.
Users of the Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes several security issues is\nnow available.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain services\nand applications allow remote unauthenticated attackers to provide\nenvironment variables, allowing them to exploit this issue. (CVE-2014-6271)\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nA flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One)\ninput from certain RSA signatures. A remote attacker could use this flaw to\nforge RSA certificates by providing a specially crafted signature to an\napplication using NSS. (CVE-2014-1568)\n\nIt was discovered that the fixed-sized redir_stack could be forced to\noverflow in the Bash parser, resulting in memory corruption, and possibly\nleading to arbitrary code execution when evaluating untrusted input that\nwould not otherwise be run as code. (CVE-2014-7186)\n\nAn off-by-one error was discovered in the way Bash was handling deeply\nnested flow control constructs. Depending on the layout of the .bss\nsegment, this could allow arbitrary execution of code that would not\notherwise be executed by Bash. (CVE-2014-7187)\n\nRed Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271,\nand the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges\nAntoine Delignat-Lavaud and Intel Product Security Incident Response Team\nas the original reporters of CVE-2014-1568. The CVE-2014-7186 and\nCVE-2014-7187 issues were discovered by Florian Weimer of Red Hat Product\nSecurity.\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1354", "url": "https://access.redhat.com/errata/RHSA-2014:1354" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1141597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "category": "external", "summary": "1145429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429" }, { "category": "external", "summary": "1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1354.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security update", "tracking": { "current_release_date": "2024-12-15T18:38:44+00:00", "generator": { "date": "2024-12-15T18:38:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2014:1354", "initial_release_date": "2014-10-02T18:40:05+00:00", "revision_history": [ { "date": "2014-10-02T18:40:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-02T18:40:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:38:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV-M 3.4", "product": { "name": "RHEV-M 3.4", "product_id": "6Server-RHEV-S-3.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhev_manager:3" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "product": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "product_id": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "product": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "product_id": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch as a component of RHEV-M 3.4", "product_id": "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch" }, "product_reference": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "relates_to_product_reference": "6Server-RHEV-S-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src as a component of RHEV-M 3.4", "product_id": "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" }, "product_reference": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", "relates_to_product_reference": "6Server-RHEV-S-3.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Antoine Delignat-Lavaud", "Intel Product Security Incident Response Team" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1568", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2014-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1145429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS.", "title": "Vulnerability description" }, { "category": "summary", "text": "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1568" }, { "category": "external", "summary": "RHBZ#1145429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1568", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1568" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)" }, { "cve": "CVE-2014-6271", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "discovery_date": "2014-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1141597" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: specially-crafted environment variables can be used to inject shell commands", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6271" }, { "category": "external", "summary": "RHBZ#1141597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6271", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271" }, { "category": "external", "summary": "https://access.redhat.com/articles/1200223", "url": "https://access.redhat.com/articles/1200223" }, { "category": "external", "summary": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack", "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "bash: specially-crafted environment variables can be used to inject shell commands" }, { "cve": "CVE-2014-7169", "cwe": { "id": "CWE-228", "name": "Improper Handling of Syntactically Invalid Structure" }, "discovery_date": "2014-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146319" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "RHBZ#1146319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "category": "external", "summary": "RHSB-shellshock", "url": "https://access.redhat.com/security/vulnerabilities/shellshock" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-01-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7186", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146791" } ], "notes": [ { "category": "description", "text": "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: parser can allow out-of-bounds memory access while handling redir_stack", "title": "Vulnerability summary" }, { "category": "other", "text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7186" }, { "category": "external", "summary": "RHBZ#1146791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" } ], "release_date": "2014-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: parser can allow out-of-bounds memory access while handling redir_stack" }, { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-7187", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2014-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1146804" } ], "notes": [ { "category": "description", "text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bash: off-by-one error in deeply nested flow control constructs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "RHBZ#1146804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" } ], "release_date": "2014-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-02T18:40:05+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1354" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bash: off-by-one error in deeply nested flow control constructs" } ] }
cve-2014-7187
Vulnerability from cvelistv5
Published
2014-09-28 19:00
Modified
2024-08-06 12:40
Severity ?
EPSS score ?
Summary
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/security/cve/CVE-2014-7187.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61283" }, { "name": "APPLE-SA-2015-09-30-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61654" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62312" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/support/shellshock/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61618" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61552" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200223" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61855" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61857" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/security/cve/CVE-2014-7187.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61283" }, { "name": "APPLE-SA-2015-09-30-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61654" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62312" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/support/shellshock/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61618" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61552" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200223" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61855" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61857" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts", "refsource": "CONFIRM", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "name": "http://support.novell.com/security/cve/CVE-2014-7187.html", "refsource": "CONFIRM", "url": "http://support.novell.com/security/cve/CVE-2014-7187.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61283" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61654" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62312" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648", "refsource": "CONFIRM", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60024" }, { "name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61565" }, { "name": "https://www.suse.com/support/shellshock/", "refsource": "CONFIRM", "url": "https://www.suse.com/support/shellshock/" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61618" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60193" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61643" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015721", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61503" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "refsource": "CONFIRM", "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61552" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "name": "https://support.citrix.com/article/CTX200223", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200223" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "HPSBGN03138", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61855" }, { "name": "60044", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61128" }, { "name": "https://support.citrix.com/article/CTX200217", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200217" }, { "name": "60055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61633" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61328" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61857" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7187", "datePublished": "2014-09-28T19:00:00", "dateReserved": "2014-09-25T00:00:00", "dateUpdated": "2024-08-06T12:40:19.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-1568
Vulnerability from cvelistv5
Published
2014-09-25 17:00
Modified
2024-08-06 09:42
Severity ?
EPSS score ?
Summary
Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:42:36.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "VU#772676", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/772676" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "RHSA-2014:1307", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1307.html" }, { "name": "70116", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70116" }, { "name": "USN-2360-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2360-1" }, { "name": "mozilla-nss-cve20141568-sec-bypass(96194)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96194" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "name": "61575", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61575" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069405" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064636" }, { "name": "SUSE-SU-2014:1220", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html" }, { "name": "GLSA-201504-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201504-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "61574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61574" }, { "name": "USN-2361-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2361-1" }, { "name": "DSA-3033", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3033" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "DSA-3034", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3034" }, { "name": "RHSA-2014:1371", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1371.html" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "DSA-3037", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3037" }, { "name": "openSUSE-SU-2014:1224", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html" }, { "name": "USN-2360-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2360-2" }, { "name": "61540", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61540" }, { "name": "61576", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61576" }, { "name": "openSUSE-SU-2014:1232", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html" }, { "name": "61583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61583" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a \"signature malleability\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "VU#772676", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/772676" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "RHSA-2014:1307", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1307.html" }, { "name": "70116", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70116" }, { "name": "USN-2360-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2360-1" }, { "name": "mozilla-nss-cve20141568-sec-bypass(96194)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96194" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "name": "61575", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61575" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069405" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064636" }, { "name": "SUSE-SU-2014:1220", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html" }, { "name": "GLSA-201504-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201504-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "61574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61574" }, { "name": "USN-2361-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2361-1" }, { "name": "DSA-3033", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3033" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "DSA-3034", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3034" }, { "name": "RHSA-2014:1371", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1371.html" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "DSA-3037", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3037" }, { "name": "openSUSE-SU-2014:1224", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html" }, { "name": "USN-2360-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2360-2" }, { "name": "61540", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61540" }, { "name": "61576", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61576" }, { "name": "openSUSE-SU-2014:1232", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html" }, { "name": "61583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61583" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2014-1568", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a \"signature malleability\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "VU#772676", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/772676" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "RHSA-2014:1307", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1307.html" }, { "name": "70116", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70116" }, { "name": "USN-2360-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2360-1" }, { "name": "mozilla-nss-cve20141568-sec-bypass(96194)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96194" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015701", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "name": "61575", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61575" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069405", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069405" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064636", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064636" }, { "name": "SUSE-SU-2014:1220", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html" }, { "name": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html" }, { "name": "GLSA-201504-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201504-01" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "61574", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61574" }, { "name": "USN-2361-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2361-1" }, { "name": "DSA-3033", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3033" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "DSA-3034", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3034" }, { "name": "RHSA-2014:1371", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1371.html" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "DSA-3037", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3037" }, { "name": "openSUSE-SU-2014:1224", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html" }, { "name": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html" }, { "name": "USN-2360-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2360-2" }, { "name": "61540", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61540" }, { "name": "61576", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61576" }, { "name": "openSUSE-SU-2014:1232", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html" }, { "name": "61583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61583" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2014-1568", "datePublished": "2014-09-25T17:00:00", "dateReserved": "2014-01-16T00:00:00", "dateUpdated": "2024-08-06T09:42:36.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7186
Vulnerability from cvelistv5
Published
2014-09-28 19:00
Modified
2024-08-06 12:40
Severity ?
EPSS score ?
Summary
The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61816" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "APPLE-SA-2015-09-30-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61654" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62312" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/security/cve/CVE-2014-7186.html" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/support/shellshock/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61618" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61780" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200223" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61603" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61816" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "APPLE-SA-2015-09-30-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61654" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62312" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/security/cve/CVE-2014-7186.html" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/support/shellshock/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61618" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61780" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200223" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61603" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts", "refsource": "CONFIRM", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "openSUSE-SU-2014:1254", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60433" }, { "name": "[oss-security] 20140925 Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "name": "HPSBMU03143", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "HPSBST03155", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61636", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61636" }, { "name": "61816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61816" }, { "name": "61442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "61283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "61654", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61654" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62312" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61703" }, { "name": "USN-2364-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "name": "61065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61065" }, { "name": "HPSBST03129", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "61641", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648", "refsource": "CONFIRM", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205267" }, { "name": "HPSBMU03220", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60024" }, { "name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "61622", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61622" }, { "name": "20140926 GNU Bash Environment Variable Command Injection Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "http://support.novell.com/security/cve/CVE-2014-7186.html", "refsource": "CONFIRM", "url": "http://support.novell.com/security/cve/CVE-2014-7186.html" }, { "name": "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "name": "62343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61565" }, { "name": "https://www.suse.com/support/shellshock/", "refsource": "CONFIRM", "url": "https://www.suse.com/support/shellshock/" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204244" }, { "name": "HPSBST03157", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101830", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "SSRT101742", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61873" }, { "name": "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "name": "61485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61618" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "HPSBST03154", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60193" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60034" }, { "name": "59907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61643" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015721", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61503" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBMU03236", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "refsource": "CONFIRM", "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61780" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "name": "https://support.citrix.com/article/CTX200223", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200223" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "60044", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "61287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "HPSBGN03141", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61128" }, { "name": "https://support.citrix.com/article/CTX200217", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60055" }, { "name": "61550", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61633" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61328" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61129" }, { "name": "61603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61603" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7186", "datePublished": "2014-09-28T19:00:00", "dateReserved": "2014-09-25T00:00:00", "dateUpdated": "2024-08-06T12:40:19.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7169
Vulnerability from cvelistv5
Published
2014-09-25 01:00
Modified
2024-08-06 12:40
Severity ?
EPSS score ?
Summary
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.217Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "[oss-security] 20140924 Re: CVE-2014-6271: remote code execution through bash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/24/32" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "HPSBHF03119", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "61676", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61676" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60433" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "RHSA-2014:1306", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1306.html" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "name": "61715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61715" }, { "name": "USN-2363-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2363-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "HPSBST03195", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61654" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62312" }, { "name": "59272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59272" }, { "name": "HPSBST03122", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "USN-2363-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2363-1" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61703" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6495" }, { "name": "VU#252743", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/252743" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61065" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-3075.html" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/security/cve/CVE-2014-7169.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "TA14-268A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/ncas/alerts/TA14-268A" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/node/1200223" }, { "name": "SUSE-SU-2014:1287", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "APPLE-SA-2014-10-16-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "61619", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61619" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-3078.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60325", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60325" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "34879", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/34879/" }, { "name": "61622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61622" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/articles/1200223" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62343" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0393.html" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/support/shellshock/" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61873" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61618" }, { "name": "60947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60947" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT6535" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60034" }, { "name": "HPSBMU03133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://twitter.com/taviso/statuses/514887394294652929" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBGN03117", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "HPSBHF03145", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61780" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200223" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-3077.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61855" }, { "name": "HPSBHF03124", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "59737", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59737" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBHF03146", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61128" }, { "name": "DSA-3035", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3035" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60055" }, { "name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1306.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61700", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61700" }, { "name": "61626", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61626" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61857" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-24T00:00:00", "descriptions": [ { "lang": "en", "value": "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-05T16:41:42", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "[oss-security] 20140924 Re: CVE-2014-6271: remote code execution through bash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/24/32" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "HPSBHF03119", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "61676", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61676" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60433" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "RHSA-2014:1306", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1306.html" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "name": "61715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61715" }, { "name": "USN-2363-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2363-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "HPSBST03195", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61654" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62312" }, { "name": "59272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59272" }, { "name": "HPSBST03122", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "USN-2363-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2363-1" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61703" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6495" }, { "name": "VU#252743", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/252743" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61065" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-3075.html" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/security/cve/CVE-2014-7169.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "TA14-268A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/ncas/alerts/TA14-268A" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/node/1200223" }, { "name": "SUSE-SU-2014:1287", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "APPLE-SA-2014-10-16-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "61619", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61619" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-3078.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60325", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60325" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "34879", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/34879/" }, { "name": "61622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61622" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/articles/1200223" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62343" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0393.html" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/support/shellshock/" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61873" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61618" }, { "name": "60947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60947" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT6535" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60034" }, { "name": "HPSBMU03133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_MISC" ], "url": "http://twitter.com/taviso/statuses/514887394294652929" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBGN03117", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "HPSBHF03145", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61780" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200223" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-3077.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61855" }, { "name": "HPSBHF03124", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "59737", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59737" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBHF03146", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61128" }, { "name": "DSA-3035", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3035" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60055" }, { "name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1306.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61700", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61700" }, { "name": "61626", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61626" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61857" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7169", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "[oss-security] 20140924 Re: CVE-2014-6271: remote code execution through bash", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/09/24/32" }, { "name": "HPSBMU03165", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "HPSBHF03119", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts", "refsource": "CONFIRM", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "openSUSE-SU-2014:1229", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "61188", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61188" }, { "name": "JVN#55667175", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "61676", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61676" }, { "name": "openSUSE-SU-2014:1254", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60433" }, { "name": "HPSBMU03143", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "RHSA-2014:1306", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1306.html" }, { "name": "HPSBST03155", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "name": "61715", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61715" }, { "name": "USN-2363-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2363-2" }, { "name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "HPSBST03195", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "name": "61283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61654" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015701", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62312" }, { "name": "59272", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59272" }, { "name": "HPSBST03122", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "RHSA-2014:1312", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "USN-2363-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2363-1" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61703" }, { "name": "http://support.apple.com/kb/HT6495", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6495" }, { "name": "VU#252743", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/252743" }, { "name": "61065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61065" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-3075.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-3075.html" }, { "name": "HPSBST03129", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "name": "http://support.novell.com/security/cve/CVE-2014-7169.html", "refsource": "CONFIRM", "url": "http://support.novell.com/security/cve/CVE-2014-7169.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "JVNDB-2014-000126", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "TA14-268A", "refsource": "CERT", "url": "http://www.us-cert.gov/ncas/alerts/TA14-268A" }, { "name": "61641", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61641" }, { "name": "SUSE-SU-2014:1247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648", "refsource": "CONFIRM", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "name": "https://access.redhat.com/node/1200223", "refsource": "CONFIRM", "url": "https://access.redhat.com/node/1200223" }, { "name": "SUSE-SU-2014:1287", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "APPLE-SA-2014-10-16-1", "refsource": "APPLE", "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "61619", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61619" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-3078.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-3078.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "HPSBMU03220", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60325", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60325" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "60024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60024" }, { "name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "34879", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/34879/" }, { "name": "61622", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61622" }, { "name": "https://access.redhat.com/articles/1200223", "refsource": "CONFIRM", "url": "https://access.redhat.com/articles/1200223" }, { "name": "62343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62343" }, { "name": "http://advisories.mageia.org/MGASA-2014-0393.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0393.html" }, { "name": "61565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61565" }, { "name": "https://www.suse.com/support/shellshock/", "refsource": "CONFIRM", "url": "https://www.suse.com/support/shellshock/" }, { "name": "HPSBST03157", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101742", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61873" }, { "name": "61485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61485" }, { "name": "openSUSE-SU-2014:1242", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "name": "61618", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61618" }, { "name": "60947", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60947" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "https://support.apple.com/kb/HT6535", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT6535" }, { "name": "HPSBST03154", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60193" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "61479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61479" }, { "name": "60063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60063" }, { "name": "60034", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60034" }, { "name": "HPSBMU03133", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2" }, { "name": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", "refsource": "MISC", "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "name": "59907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61643" }, { "name": "http://twitter.com/taviso/statuses/514887394294652929", "refsource": "MISC", "url": "http://twitter.com/taviso/statuses/514887394294652929" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015721", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61503" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "HPSBGN03117", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "HPSBHF03145", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "name": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "refsource": "CONFIRM", "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61780" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "name": "https://support.citrix.com/article/CTX200223", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200223" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-3077.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-3077.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61855" }, { "name": "HPSBHF03124", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2" }, { "name": "60044", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61291" }, { "name": "HPSBHF03125", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "59737", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59737" }, { "name": "61287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBHF03146", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "HPSBGN03141", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "RHSA-2014:1311", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "name": "61128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61128" }, { "name": "DSA-3035", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3035" }, { "name": "https://support.citrix.com/article/CTX200217", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60055" }, { "name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "61550", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61633" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1306.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-1306.html" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "SUSE-SU-2014:1259", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "name": "61328", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61328" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "61129", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61129" }, { "name": "61700", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61700" }, { "name": "61626", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61626" }, { "name": "61603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61857" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7169", "datePublished": "2014-09-25T01:00:00", "dateReserved": "2014-09-24T00:00:00", "dateUpdated": "2024-08-06T12:40:19.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-6271
Vulnerability from cvelistv5
Published
2014-09-24 18:00
Modified
2024-08-06 12:10
Severity ?
EPSS score ?
Summary
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:10:13.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37816", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/37816/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "SUSE-SU-2014:1223", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "SSRT101816", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2" }, { "name": "39918", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/39918/" }, { "name": "HPSBHF03119", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2" }, { "name": "RHSA-2014:1295", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html" }, { "name": "openSUSE-SU-2014:1226", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "HPSBST03196", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61188" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "61676", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61676" }, { "name": "40619", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40619/" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60433" }, { "name": "38849", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/38849/" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673" }, { "name": "SUSE-SU-2014:1260", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "name": "61715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61715" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "HPSBST03195", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "USN-2362-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2362-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61654" }, { "name": "61542", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61542" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62312" }, { "name": "59272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59272" }, { "name": "HPSBST03122", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61703" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6495" }, { "name": "VU#252743", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/252743" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61065" }, { "name": "SUSE-SU-2014:1213", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "70103", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70103" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "TA14-268A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/ncas/alerts/TA14-268A" }, { "name": "SUSE-SU-2014:1212", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61641" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/node/1200223" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html" }, { "name": "SUSE-SU-2014:1287", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "APPLE-SA-2014-10-16-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "RHSA-2014:1293", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "openSUSE-SU-2014:1238", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60325", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60325" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "34879", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/34879/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/articles/1200223" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/support/shellshock/" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61873" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61485" }, { "name": "60947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60947" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT6535" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "HPSBST03265", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1294.html" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60063" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60034" }, { "name": "HPSBMU03133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "40938", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40938/" }, { "name": "HPSBGN03117", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/security/cve/CVE-2014-6271.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "61547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61547" }, { "name": "HPSBHF03145", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61780" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200223" }, { "name": "DSA-3032", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3032" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61855" }, { "name": "HPSBHF03124", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61291" }, { "name": "RHSA-2014:1294", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "59737", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59737" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBHF03146", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0388.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60055" }, { "name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1293.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "42938", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42938/" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61700", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61700" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61857" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-24T00:00:00", "descriptions": [ { "lang": "en", "value": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-05T16:37:05", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "37816", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/37816/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "SUSE-SU-2014:1223", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "SSRT101816", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2" }, { "name": "39918", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/39918/" }, { "name": "HPSBHF03119", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2" }, { "name": "RHSA-2014:1295", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html" }, { "name": "openSUSE-SU-2014:1226", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "HPSBST03196", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2" }, { "name": "61188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61188" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" }, { "name": "JVN#55667175", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "61676", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61676" }, { "name": "40619", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40619/" }, { "name": "openSUSE-SU-2014:1254", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60433" }, { "name": "38849", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/38849/" }, { "name": "HPSBMU03143", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673" }, { "name": "SUSE-SU-2014:1260", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html" }, { "name": "HPSBST03155", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "name": "61715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61715" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "HPSBST03195", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "name": "61283", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "USN-2362-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2362-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61654" }, { "name": "61542", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61542" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62312" }, { "name": "59272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59272" }, { "name": "HPSBST03122", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61703" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6495" }, { "name": "VU#252743", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/252743" }, { "name": "61065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61065" }, { "name": "SUSE-SU-2014:1213", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html" }, { "name": "HPSBST03129", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "70103", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70103" }, { "name": "JVNDB-2014-000126", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "TA14-268A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/ncas/alerts/TA14-268A" }, { "name": "SUSE-SU-2014:1212", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html" }, { "name": "61641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61641" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/node/1200223" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html" }, { "name": "SUSE-SU-2014:1287", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "APPLE-SA-2014-10-16-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "RHSA-2014:1293", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "openSUSE-SU-2014:1238", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html" }, { "name": "HPSBMU03220", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60325", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60325" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "60024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60024" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "34879", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/34879/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/articles/1200223" }, { "name": "62343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61565" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/support/shellshock/" }, { "name": "HPSBST03157", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101742", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61873" }, { "name": "61485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61485" }, { "name": "60947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60947" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT6535" }, { "name": "HPSBST03154", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "HPSBST03265", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1294.html" }, { "name": "60063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60063" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html" }, { "name": "60034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60034" }, { "name": "HPSBMU03133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "name": "59907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61643" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61503" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "40938", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40938/" }, { "name": "HPSBGN03117", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/security/cve/CVE-2014-6271.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "61547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61547" }, { "name": "HPSBHF03145", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61780" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200223" }, { "name": "DSA-3032", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3032" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61855" }, { "name": "HPSBHF03124", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2" }, { "name": "60044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61291" }, { "name": "RHSA-2014:1294", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html" }, { "name": "HPSBHF03125", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "59737", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59737" }, { "name": "61287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBHF03146", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "HPSBGN03141", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0388.html" }, { "name": "61128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60055" }, { "name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "61550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1293.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "61328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61328" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "42938", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42938/" }, { "name": "61129", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61129" }, { "name": "61700", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61700" }, { "name": "61603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61857" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-6271", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37816", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/37816/" }, { "name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "name": "SUSE-SU-2014:1223", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "name": "HPSBMU03165", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "name": "SSRT101816", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2" }, { "name": "39918", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/39918/" }, { "name": "HPSBHF03119", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2" }, { "name": "RHSA-2014:1295", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html" }, { "name": "openSUSE-SU-2014:1226", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html" }, { "name": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", "refsource": "CONFIRM", "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts", "refsource": "CONFIRM", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts" }, { "name": "HPSBST03131", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2" }, { "name": "SSRT101819", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "name": "HPSBMU03245", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "name": "HPSBST03196", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2" }, { "name": "61188", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61188" }, { "name": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", "refsource": "CONFIRM", "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" }, { "name": "JVN#55667175", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "name": "61676", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61676" }, { "name": "40619", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40619/" }, { "name": "openSUSE-SU-2014:1254", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "name": "60433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60433" }, { "name": "38849", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/38849/" }, { "name": "HPSBMU03143", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "name": "HPSBMU03182", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673" }, { "name": "SUSE-SU-2014:1260", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html" }, { "name": "HPSBST03155", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "name": "61715", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61715" }, { "name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "name": "61816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61816" }, { "name": "openSUSE-SU-2014:1310", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "name": "61442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61442" }, { "name": "HPSBMU03246", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "name": "HPSBST03195", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "name": "61283", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61283" }, { "name": "SSRT101711", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "USN-2362-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2362-1" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085" }, { "name": "openSUSE-SU-2014:1308", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "name": "61654", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61654" }, { "name": "61542", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61542" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015701", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "name": "62312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62312" }, { "name": "59272", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59272" }, { "name": "HPSBST03122", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "name": "HPSBMU03217", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61703" }, { "name": "http://support.apple.com/kb/HT6495", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6495" }, { "name": "VU#252743", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/252743" }, { "name": "61065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61065" }, { "name": "SUSE-SU-2014:1213", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html" }, { "name": "HPSBST03129", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "name": "HPSBMU03144", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "name": "70103", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70103" }, { "name": "JVNDB-2014-000126", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "name": "SSRT101827", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "name": "TA14-268A", "refsource": "CERT", "url": "http://www.us-cert.gov/ncas/alerts/TA14-268A" }, { "name": "SUSE-SU-2014:1212", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html" }, { "name": "61641", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61641" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648", "refsource": "CONFIRM", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "name": "https://access.redhat.com/node/1200223", "refsource": "CONFIRM", "url": "https://access.redhat.com/node/1200223" }, { "name": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html" }, { "name": "SUSE-SU-2014:1287", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "name": "APPLE-SA-2014-10-16-1", "refsource": "APPLE", "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "name": "MDVSA-2015:164", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "name": "RHSA-2014:1293", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075" }, { "name": "openSUSE-SU-2014:1238", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html" }, { "name": "HPSBMU03220", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "name": "60325", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60325" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "60024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60024" }, { "name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "name": "34879", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/34879/" }, { "name": "https://access.redhat.com/articles/1200223", "refsource": "CONFIRM", "url": "https://access.redhat.com/articles/1200223" }, { "name": "62343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62343" }, { "name": "61565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61565" }, { "name": "https://www.suse.com/support/shellshock/", "refsource": "CONFIRM", "url": "https://www.suse.com/support/shellshock/" }, { "name": "HPSBST03157", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "name": "61313", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61313" }, { "name": "SSRT101742", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "name": "61873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61873" }, { "name": "61485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61485" }, { "name": "60947", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60947" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183" }, { "name": "https://support.apple.com/kb/HT6535", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT6535" }, { "name": "HPSBST03154", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "name": "HPSBST03265", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "name": "HPSBGN03142", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "name": "61312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61312" }, { "name": "60193", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60193" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1294.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-1294.html" }, { "name": "60063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60063" }, { "name": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html" }, { "name": "60034", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60034" }, { "name": "HPSBMU03133", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2" }, { "name": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", "refsource": "MISC", "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "name": "59907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59907" }, { "name": "58200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58200" }, { "name": "HPSBST03181", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "name": "61643", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61643" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015721", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "name": "61503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61503" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "name": "RHSA-2014:1354", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "name": "40938", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40938/" }, { "name": "HPSBGN03117", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2" }, { "name": "http://support.novell.com/security/cve/CVE-2014-6271.html", "refsource": "CONFIRM", "url": "http://support.novell.com/security/cve/CVE-2014-6271.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "name": "61547", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61547" }, { "name": "HPSBHF03145", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "name": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "refsource": "CONFIRM", "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "name": "HPSBST03148", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2" }, { "name": "61552", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61552" }, { "name": "61780", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61780" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "name": "https://support.citrix.com/article/CTX200223", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200223" }, { "name": "DSA-3032", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3032" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "name": "62228", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62228" }, { "name": "HPSBGN03138", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "name": "61855", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61855" }, { "name": "HPSBHF03124", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2" }, { "name": "60044", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60044" }, { "name": "61291", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61291" }, { "name": "RHSA-2014:1294", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html" }, { "name": "HPSBHF03125", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "name": "59737", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59737" }, { "name": "61287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61287" }, { "name": "HPSBHF03146", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61711", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61711" }, { "name": "HPSBOV03228", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "name": "HPSBGN03141", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "name": "http://advisories.mageia.org/MGASA-2014-0388.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0388.html" }, { "name": "61128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61128" }, { "name": "https://support.citrix.com/article/CTX200217", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX200217" }, { "name": "61471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61471" }, { "name": "60055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60055" }, { "name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "name": "61550", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61550" }, { "name": "61633", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61633" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1293.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-1293.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" }, { "name": "61328", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61328" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "name": "42938", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42938/" }, { "name": "61129", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61129" }, { "name": "61700", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61700" }, { "name": "61603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61603" }, { "name": "61857", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61857" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "name": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-6271", "datePublished": "2014-09-24T18:00:00", "dateReserved": "2014-09-09T00:00:00", "dateUpdated": "2024-08-06T12:10:13.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.