var-201409-0366
Vulnerability from variot
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169. This vulnerability CVE-2014-6271 and CVE-2014-7169 Vulnerability due to insufficient fix for.Arbitrary code execution or denial of service by a third party through a crafted environment ( Uninitialized memory access and untrusted pointer read and write operations ) There is a possibility of being put into a state. QNAP Systems, Inc. Provided by QTS teeth, Turbo NAS for OS is. QTS for, GNU Bash Vulnerability (JVNVU#97219505) caused by OS Command injection vulnerability (CWE-78) Exists. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : University of Electro-Communications Wakisaka Yuki MrAny application permission OS The command may be executed. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script. HP Integrity Superdome X and HP Converged System 900 for SAP HANA 5.50.12
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has released the following firmware updates to HP Integrity Superdome X and HP ConvergedSystem 900 for SAP HANA 5.50.12 to resolve these vulnerabilities:
The firmware upgrade for HP Integrity Superdome X and HP Converged System 900 for SAP HANA 5.73.0 is not directly available to customers. Customers who need to upgrade the firmware of their Superdome X or HP Converged System 900 for SAP HANA should contact HP Technical Support to obtain the firmware or plan to schedule an onsite visit with an HP Services field service professional.
NOTE: HP strongly recommends implementing the following security best practices to help reduce both known and future security vulnerability risks:
Isolate the HP Superdome X or HP Converged System 900 for SAP HANA's management network by keeping it separate from the data or production network, and not connecting it directly to the Internet without additional access authentication. Patch and maintain Lightweight Directory Access Protocol (LDAP) and web servers. Use virus scanners, intrusion detection/prevention systems (IDS/IPS), and vulnerability scanners regularly. ============================================================================ Ubuntu Security Notice USN-2380-1 October 09, 2014
bash vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in Bash.
Software Description: - bash: GNU Bourne Again SHell
Details:
Michal Zalewski discovered that Bash incorrectly handled parsing certain function definitions. If an attacker were able to create an environment variable containing a function definition with a very specific name, these issues could possibly be used to bypass certain environment restrictions and execute arbitrary code. (CVE-2014-6277, CVE-2014-6278)
Please note that the previous Bash security update, USN-2364-1, includes a hardening measure that prevents these issues from being used in a Shellshock attack.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: bash 4.3-7ubuntu1.5
Ubuntu 12.04 LTS: bash 4.2-2ubuntu2.6
Ubuntu 10.04 LTS: bash 4.1-2ubuntu3.5
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2380-1 CVE-2014-6277, CVE-2014-6278
Package Information: https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.5 https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.6 https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.5 . This bulletin will be revised when the updates are available.
MITIGATION INFORMATION
HP recommends the following steps to reduce the risk of this vulnerability:
- The "ssh" or "telnet" features may be disabled by the admin user. All
MDS and Nexus 5K switches can function in this configuration. Access is available through the console port. Good morning! This is kinda long.
== Background ==
If you are not familiar with the original bash function export vulnerability (CVE-2014-6271), you may want to have a look at this article:
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
Well, long story short: the initial maintainer-provided patch for this issue [1] (released on September 24) is conclusively broken.
After nagging people to update for a while [5] [7], I wanted to share the technical details of two previously non-public issues which may be used to circumvent the original patch: CVE-2014-6277 and CVE-2014-6278.
Note that the issues discussed here are separate from the three probably less severe problems publicly disclosed earlier on: Tavis' limited-exploitability EOL bug (CVE-2014-7169) and two likely non-exploitable one-off issues found by Florian Weimer and Todd Sabin (CVE-2014-7186 and CVE-2014-7187).
== Required actions ==
If you have installed just the September 24 patch [1], or that and the follow-up September 26 patch for CVE-2014-7169 [2], you are likely still vulnerable to RCE and need to update ASAP, as discussed in [5].
You are safe if you have installed the unofficial function prefix patch from Florian Weimer [3], or its upstream variant released on September 28 [4]. The patch does not eliminate the problems, but shields the underlying parser from untrusted inputs under normal circumstances.
Note: over the past few days, Florian's patch has been picked up by major Linux distros (Red Hat, Debian, SUSE, etc), so there is a reasonable probability that you are in good shape. To test, execute this command from within a bash shell:
foo='() { echo not patched; }' bash -c foo
If you see "not patched", you probably want upgrade immediately. If you see "bash: foo: command not found", you're OK.
== Vulnerability details: CVE-2014-6277 (the more involved one) ==
The following function definition appearing in the value of any environmental variable passed to bash will lead to an attempt to dereference attacker-controlled pointers (provided that the targeted instance of bash is protected only with the original patches [1][2] and does not include Florian's fix):
() { x() { ; }; x() { ; } <<a; }
A more complete example leading to a deref of 0x41414141 would be:
HTTP_COOKIE="() { x() { ; }; x() { ; } <<perl -e '{print
"A"x1000}'
; }" bash -c :
bash[25662]: segfault at 41414141 ip 00190d96 sp bfbe6354 error 4 in libc-2.12.so[110000+191000]
(If you are seeing 0xdfdfdfdf, see note later on).
The issue is caused by an uninitialized here_doc_eof field in a REDIR struct originally created in make_redirection(). The initial segv will happen due to an attempt to read and then copy a string to a new buffer through a macro that expands to:
strcpy (xmalloc (1 + strlen (redirect->here_doc_eof)), (redirect->here_doc_eof))
This appears to be exploitable in at least one way: if here_doc_eof is chosen by the attacker to point in the vicinity of the current stack pointer, the apparent contents of the string - and therefore its length - may change between stack-based calls to xmalloc() and strcpy() as a natural consequence of an attempt to pass parameters and create local variables. Such a mid-macro switch will result in an out-of-bounds write to the newly-allocated memory.
A simple conceptual illustration of this attack vector would be:
-- snip! -- char* result; int len_alloced;
main(int argc, char** argv) {
/ The offset will be system- and compiler-specific /; char* ptr = &ptr - 9;
result = strcpy (malloc(100 + (len_alloced = strlen(ptr))), ptr);
printf("requested memory = %d\n" "copied text = %d\n", len_alloced + 1, strlen(result) + 1);
} -- snip! --
When compiled with the -O2 flag used for bash, on one test system, this produces:
requested memory = 2 copied text = 28
This can lead to heap corruption, with multiple writes possible per payload by simply increasing the number of malformed here-docs. The consequences should be fairly clear.
[ There is also a latter call to free() on here_doc_eof in dispose_cmd.c, but because of the simultaneous discovery of the much simpler bug '78 discussed in the next section, I have not spent a whole lot of time trying to figure out how to get to that path. ]
Perhaps notably, the ability to specify attacker-controlled addresses hinges on the state of --enable-bash-malloc and --enable-mem-scramble compile-time flags; if both are enabled, the memory returned by xmalloc() will be initialized to 0xdf, making the prospect of exploitation more speculative (essentially depending on whether the stack or any other memory region can be grown to overlap with 0xdfdfdfdf). That said, many Linux distributions disable one or both flags and are vulnerable out-of-the-box. It is also of note that relatively few distributions compile bash as PIE, so there is little consolation to be found in ASLR.
Similarly to the original vulnerability, this issue can be usually triggered remotely through web servers such as Apache (provided that they invoke CGI scripts or PHP / Python / Perl / C / Java servlets that rely on system() or popen()-type libcalls); through DHCP clients; and through some MUAs and MTAs. For a more detailed discussion of the exposed attack surface, refer to [6].
== Vulnerability details: CVE-2014-6278 (the "back to the '90s" one) ==
The following function definition appearing in the value of any environmental variable passed to bash 4.2 or 4.3 will lead to straightforward put-your-command-here RCE (again, provided that the targeted instance is not protected with Florian's patch):
() { ; } >[$($())] { echo hi mom; id; }
A complete example looks like this:
HTTP_COOKIE='() { ; } >[$($())] { echo hi mom; id; }' bash -c :
...or:
GET /some/script.cgi HTTP/1.0 User-Agent: () { ; } >[$($())] { id >/tmp/hi_mom; }
Note that the PoC does not work as-is in more ancient versions of bash, such as 2.x or 3.x; it might have been introduced with xparse_dolparen() starting with bash 4.2 patch level 12 few years back, but I have not investigated this in a lot of detail. Florian's patch is strongly recommended either way.
The attack surface through which this flaw may be triggered is roughly similar to that for CVE-2014-6277 and the original bash bug [6].
== Additional info ==
Both of these issues were identified in an automated fashion with american fuzzy lop:
https://code.google.com/p/american-fuzzy-lop
The out-of-the-box fuzzer was seeded with a minimal valid function definition ("() { foo() { foo; }; >bar; }") and allowed to run for a couple of hours on a single core.
In addition to the issues discussed above, the fuzzer also hit three of the four previously-reported CVEs.
I initially shared the findings privately with vendors, but because of the intense scrutiny that this codebase is under, the ease of reproducing these results with an open-source fuzzer, and the now-broad availability of upstream mitigations, there seems to be relatively little value in continued secrecy.
== References ==
[1] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-025 [2] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-026 [3] http://www.openwall.com/lists/oss-security/2014/09/25/13 [4] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027 [5] http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html [6] http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html [7] http://www.pcworld.com/article/2688932/improved-patch-tackles-new-shellshock-attack-vectors.html
PS. There are no other bugs in bash.
--------- FOLLOW UP -----------
Date: Wed, 01 Oct 2014 07:32:57 -0700 From fulldisclosure-bounces@seclists.org Wed Oct 1 14:37:33 2014 From: Paul Vixie paul@redbarn.org To: Michal Zalewski lcamtuf@coredump.cx Cc: "fulldisclosure@seclists.org" fulldisclosure@seclists.org Subject: Re: [FD] the other bash RCEs (CVE-2014-6277 and CVE-2014-6278)
michal, thank you for your incredibly informative report here. i have a minor correction.
Michal Zalewski lcamtuf@coredump.cx Wednesday, October 01, 2014 7:21 AM ...
Note: over the past few days, Florian's patch has been picked up by major Linux distros (Red Hat, Debian, SUSE, etc), so there is a reasonable probability that you are in good shape. To test, execute this command from within a bash shell:
foo='() { echo not patched; }' bash -c foo
this command need not be executed from within bash. the problem occurs when bash is run by the command, and the shell that runs the command can be anything. for example, on a system where i have deliberately not patched bash, where sh is "ash" (almquist shell):
$ foo='() { echo not patched; }' bash -c foo not patched
here's me testing it from within tcsh:
% env foo='() { echo not patched; }' bash -c foo not patched % (setenv foo '() { echo not patched; }'; bash -c foo) not patched
this is a minor issue, but i've found in matters of security bug reports, tests, and discussions, that any minor matter can lead to deep misunderstanding.
thanks again for your excellent report, and your continuing work on this issue.
vixie
.
Open the PXE Configuration Utility on the HP Insight Control server deployment window Select Linux Managed from the Boot Menu options Click the Edit button. Clicking the Edit button displays the Edit Shared Menu Option window Uncheck the x86 option in Operating System and Processor Options and click OK. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04512907
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04512907 Version: 1
HPSBMU03217 rev.1 - HP Vertica Analytics Platform running Bash Shell, Remote Code Execution
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2014-12-16 Last Updated: 2014-12-16
Potential Security Impact: Remote code execution
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP Vertica.
References:
CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 SSRT101827
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Vertica AMI's and Virtual Machines prior to v7.1.1-0.
BACKGROUND
HP Vertica AMI's and Virtual Machines prior to v7.1.1-0 include a vulnerable version of the Bash shell.
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2104-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2104-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
We recommend installing Vertica v7.1.1-0 or subsequent, or manually installing a new version of Bash, such as Bash43-027.
HP has released the following updates to resolve this vulnerability for HP Vertica products.
Update to the latest VM image available at: https://my.vertica.com
For customers using the AMI version HP Vertica Analytics platform, please install the latest image available at Amazon.
HISTORY Version:1 (rev.1) - 16 December 2014 Initial release
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG &jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW
MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS
PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux
TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlSQq8cACgkQ4B86/C0qfVnhRQCeLX48R9EljRJ6FS+FOzGvUTZK tBsAnjZjWjJ7/Ua7ykToRbGpQQeKVZEW =Xllu -----END PGP SIGNATURE----- . Note: All versions of HP Thin Pro and HP Smart Zero Core operating systems prior to version 5.1.0 are affected by these vulnerabilities. Following is a complete list of affected operating systems and Hardware Platforms Affected.
Product Affected Product Versions Patch Status
HP ThinPro and HP Smart Zero Core (X86) v5.1.0 and above No update required; the Bash shell patch is incorporated into the base image.
Note: If you participated in the ThinPro 5.1.0 beta program then upgrade to the release version as soon as it becomes available.
HP ThinPro and HP Smart Zero Core (x86) v5.0.x A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-5.0-x86.xar .
The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe
HP ThinPro and HP Smart Zero Core (x86) v4.4.x A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.4-x86.xar .
The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe
HP ThinPro and HP Smart Zero Core (ARM) v4.4.x A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.4-arm.xar .
The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe
HP ThinPro and HP Smart Zero Core (X86) v4.1, v4.2, and v4.3 A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.1-4.2-4.3-x86.xar .
The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe
HP ThinPro and HP Smart Zero Core (ARM) v4.1, v4.2, and v4.3 A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.1-4.2-4.3-arm.xar .
The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe
HP ThinPro and HP Smart Zero Core (X86) v3.1, v3.2, and v3.3 Download softpaq sp69382 from: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe which contains an update package as: bash_4.1-3+deb6u2_i386.deb .
HP ThinPro and HP Smart Zero Core (ARM) v3.1, v3.2, and v3.3 Download softpaq sp69382 from: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe which contains an update package as: bash_4.1-3+deb6u2_armel.deb .
HP ThinPro and HP Smart Zero Core v2.x and earlier An update will be made available for customers upon request
HISTORY Version:1 (rev.1) - 03 October 2014 Initial release Version:2 (rev.2) - 06 November 2014 Updated List of CVEs, Updated impacted products, Updated resolution table
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201409-0366", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.7" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "2.01" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "2.0" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.4" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.1" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.0" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.6" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.2" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.3" }, { "model": "bash", "scope": "eq", "trust": 1.6, "vendor": "gnu", "version": "1.14.5" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "3.2.48" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.0" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "3.2" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.2" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "3.0.16" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "4.1" }, { "model": "bash", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "3.0" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.03" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.01.1" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.02.1" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.02" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "3.1" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.04" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "4.3" }, { "model": "bash", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "2.05" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "barracuda", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "centos", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "check point", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cygwin", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "extreme", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fireeye", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnu bash", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mageia", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mcafee", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "monroe", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "niksun", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netapp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "novell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "palo alto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "qnap security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sophos", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trend micro", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "xirrus", "version": null }, { "model": "bash", "scope": "lte", "trust": 0.8, "vendor": "gnu", "version": "4.3 bash43-026" }, { "model": "qts", "scope": "lte", "trust": 0.8, "vendor": "qnap", "version": "4.1.1 build 0927 and earlier" }, { "model": "qts", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.2" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9302" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.4" }, { "model": "network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7228" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0" }, { "model": "bash", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "3.00.0(2)" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7238" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "hat enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "email gateway hotfix", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "6.7.21" }, { "model": "directory pro", "scope": "eq", "trust": 0.3, "vendor": "cosmicperl", "version": "10.0.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.03" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "bash", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "3.1.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9301" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "phaser", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "78000" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "hat enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "ds8000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16" }, { "model": "bash rc1", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "4.0" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7232" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7242" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "phaser", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "67000" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9393" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "gss 4492r global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "colorqube", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "9303" }, { "model": "hat enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "email gateway hotfix", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "6.7.22" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7235" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.1" }, { "model": "email gateway patch", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.01" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "workcentre", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "7245" }, { "model": "unified contact center express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5(2)" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise linux client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" } ], "sources": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "BID", "id": "70165" }, { "db": "JVNDB", "id": "JVNDB-2014-004431" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "CNNVD", "id": "CNNVD-201409-1037" }, { "db": "NVD", "id": "CVE-2014-6277" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:gnu:bash", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004431" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP", "sources": [ { "db": "PACKETSTORM", "id": "128764" }, { "db": "PACKETSTORM", "id": "128753" }, { "db": "PACKETSTORM", "id": "130988" }, { "db": "PACKETSTORM", "id": "129068" }, { "db": "PACKETSTORM", "id": "129070" }, { "db": "PACKETSTORM", "id": "128666" }, { "db": "PACKETSTORM", "id": "129095" }, { "db": "PACKETSTORM", "id": "128762" }, { "db": "PACKETSTORM", "id": "130335" }, { "db": "PACKETSTORM", "id": "129617" } ], "trust": 1.0 }, "cve": "CVE-2014-6277", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2014-6277", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2014-000126", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-6277", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-6277", "trust": 0.8, "value": "High" }, { "author": "IPA", "id": "JVNDB-2014-000126", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201409-1037", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2014-6277", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-6277" }, { "db": "JVNDB", "id": "JVNDB-2014-004431" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "CNNVD", "id": "CNNVD-201409-1037" }, { "db": "NVD", "id": "CVE-2014-6277" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169. This vulnerability CVE-2014-6271 and CVE-2014-7169 Vulnerability due to insufficient fix for.Arbitrary code execution or denial of service by a third party through a crafted environment ( Uninitialized memory access and untrusted pointer read and write operations ) There is a possibility of being put into a state. QNAP Systems, Inc. Provided by QTS teeth, Turbo NAS for OS is. QTS for, GNU Bash Vulnerability (JVNVU#97219505) caused by OS Command injection vulnerability (CWE-78) Exists. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : University of Electro-Communications Wakisaka Yuki MrAny application permission OS The command may be executed. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \n\nThis vulnerability allows users that have been granted access to a shell\nscript to escalate privilege and execute unrestricted commands at the same\nsecurity level as the Bash script. \nHP Integrity Superdome X and HP Converged System 900 for SAP HANA 5.50.12\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has released the following firmware updates to HP Integrity Superdome X\nand HP ConvergedSystem 900 for SAP HANA 5.50.12 to resolve these\nvulnerabilities:\n\nThe firmware upgrade for HP Integrity Superdome X and HP Converged System 900\nfor SAP HANA 5.73.0 is not directly available to customers. Customers who\nneed to upgrade the firmware of their Superdome X or HP Converged System 900\nfor SAP HANA should contact HP Technical Support to obtain the firmware or\nplan to schedule an onsite visit with an HP Services field service\nprofessional. \n\nNOTE: HP strongly recommends implementing the following security best\npractices to help reduce both known and future security vulnerability risks:\n\nIsolate the HP Superdome X or HP Converged System 900 for SAP HANA\u0027s\nmanagement network by keeping it separate from the data or production\nnetwork, and not connecting it directly to the Internet without additional\naccess authentication. \nPatch and maintain Lightweight Directory Access Protocol (LDAP) and web\nservers. \nUse virus scanners, intrusion detection/prevention systems (IDS/IPS), and\nvulnerability scanners regularly. ============================================================================\nUbuntu Security Notice USN-2380-1\nOctober 09, 2014\n\nbash vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Bash. \n\nSoftware Description:\n- bash: GNU Bourne Again SHell\n\nDetails:\n\nMichal Zalewski discovered that Bash incorrectly handled parsing certain\nfunction definitions. If an attacker were able to create an environment\nvariable containing a function definition with a very specific name, these\nissues could possibly be used to bypass certain environment restrictions\nand execute arbitrary code. (CVE-2014-6277, CVE-2014-6278)\n\nPlease note that the previous Bash security update, USN-2364-1, includes\na hardening measure that prevents these issues from being used in a\nShellshock attack. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n bash 4.3-7ubuntu1.5\n\nUbuntu 12.04 LTS:\n bash 4.2-2ubuntu2.6\n\nUbuntu 10.04 LTS:\n bash 4.1-2ubuntu3.5\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n http://www.ubuntu.com/usn/usn-2380-1\n CVE-2014-6277, CVE-2014-6278\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.5\n https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.6\n https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.5\n. This\nbulletin will be revised when the updates are available. \n\nMITIGATION INFORMATION\n\n HP recommends the following steps to reduce the risk of this vulnerability:\n\n - The \"ssh\" or \"telnet\" features may be disabled by the admin user. All\nMDS and Nexus 5K switches can function in this configuration. Access is\navailable through the console port. Good morning! This is kinda long. \n\n== Background ==\n\nIf you are not familiar with the original bash function export\nvulnerability (CVE-2014-6271), you may want to have a look at this\narticle:\n\nhttp://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\n\nWell, long story short: the initial maintainer-provided patch for this\nissue [1] (released on September 24) is *conclusively* broken. \n\nAfter nagging people to update for a while [5] [7], I wanted to share\nthe technical details of two previously non-public issues which may be\nused to circumvent the original patch: CVE-2014-6277 and\nCVE-2014-6278. \n\nNote that the issues discussed here are separate from the three\nprobably less severe problems publicly disclosed earlier on: Tavis\u0027\nlimited-exploitability EOL bug (CVE-2014-7169) and two likely\nnon-exploitable one-off issues found by Florian Weimer and Todd Sabin\n(CVE-2014-7186 and CVE-2014-7187). \n\n== Required actions ==\n\nIf you have installed just the September 24 patch [1], or that and the\nfollow-up September 26 patch for CVE-2014-7169 [2], you are likely\nstill vulnerable to RCE and need to update ASAP, as discussed in [5]. \n\nYou are safe if you have installed the unofficial function prefix\npatch from Florian Weimer [3], or its upstream variant released on\nSeptember 28 [4]. The patch does not eliminate the problems, but\nshields the underlying parser from untrusted inputs under normal\ncircumstances. \n\nNote: over the past few days, Florian\u0027s patch has been picked up by\nmajor Linux distros (Red Hat, Debian, SUSE, etc), so there is a\nreasonable probability that you are in good shape. To test, execute\nthis command from within a bash shell:\n\nfoo=\u0027() { echo not patched; }\u0027 bash -c foo\n\nIf you see \"not patched\", you probably want upgrade immediately. If\nyou see \"bash: foo: command not found\", you\u0027re OK. \n\n== Vulnerability details: CVE-2014-6277 (the more involved one) ==\n\nThe following function definition appearing in the value of any\nenvironmental variable passed to bash will lead to an attempt to\ndereference attacker-controlled pointers (provided that the targeted\ninstance of bash is protected only with the original patches [1][2]\nand does not include Florian\u0027s fix):\n\n() { x() { _; }; x() { _; } \u003c\u003ca; }\n\nA more complete example leading to a deref of 0x41414141 would be:\n\nHTTP_COOKIE=\"() { x() { _; }; x() { _; } \u003c\u003c`perl -e \u0027{print\n\"A\"x1000}\u0027`; }\" bash -c :\n\nbash[25662]: segfault at 41414141 ip 00190d96 sp bfbe6354 error 4 in\nlibc-2.12.so[110000+191000]\n\n(If you are seeing 0xdfdfdfdf, see note later on). \n\nThe issue is caused by an uninitialized here_doc_eof field in a REDIR\nstruct originally created in make_redirection(). The initial segv will\nhappen due to an attempt to read and then copy a string to a new\nbuffer through a macro that expands to:\n\nstrcpy (xmalloc (1 + strlen (redirect-\u003ehere_doc_eof)), (redirect-\u003ehere_doc_eof))\n\nThis appears to be exploitable in at least one way: if here_doc_eof is\nchosen by the attacker to point in the vicinity of the current stack\npointer, the apparent contents of the string - and therefore its\nlength - may change between stack-based calls to xmalloc() and\nstrcpy() as a natural consequence of an attempt to pass parameters and\ncreate local variables. Such a mid-macro switch will result in an\nout-of-bounds write to the newly-allocated memory. \n\nA simple conceptual illustration of this attack vector would be:\n\n-- snip! --\nchar* result;\nint len_alloced;\n\nmain(int argc, char** argv) {\n\n /* The offset will be system- and compiler-specific */;\n char* ptr = \u0026ptr - 9;\n\n result = strcpy (malloc(100 + (len_alloced = strlen(ptr))), ptr);\n\n printf(\"requested memory = %d\\n\"\n \"copied text = %d\\n\", len_alloced + 1, strlen(result) + 1);\n\n}\n-- snip! --\n\nWhen compiled with the -O2 flag used for bash, on one test system,\nthis produces:\n\nrequested memory = 2\ncopied text = 28\n\nThis can lead to heap corruption, with multiple writes possible per\npayload by simply increasing the number of malformed here-docs. The\nconsequences should be fairly clear. \n\n[ There is also a latter call to free() on here_doc_eof in\ndispose_cmd.c, but because of the simultaneous discovery of the much\nsimpler bug \u002778 discussed in the next section, I have not spent a\nwhole lot of time trying to figure out how to get to that path. ]\n\nPerhaps notably, the ability to specify attacker-controlled addresses\nhinges on the state of --enable-bash-malloc and --enable-mem-scramble\ncompile-time flags; if both are enabled, the memory returned by\nxmalloc() will be initialized to 0xdf, making the prospect of\nexploitation more speculative (essentially depending on whether the\nstack or any other memory region can be grown to overlap with\n0xdfdfdfdf). That said, many Linux distributions disable one or both\nflags and are vulnerable out-of-the-box. It is also of note that\nrelatively few distributions compile bash as PIE, so there is little\nconsolation to be found in ASLR. \n\nSimilarly to the original vulnerability, this issue can be usually\ntriggered remotely through web servers such as Apache (provided that\nthey invoke CGI scripts or PHP / Python / Perl / C / Java servlets\nthat rely on system() or popen()-type libcalls); through DHCP clients;\nand through some MUAs and MTAs. For a more detailed discussion of the\nexposed attack surface, refer to [6]. \n\n== Vulnerability details: CVE-2014-6278 (the \"back to the \u002790s\" one) ==\n\nThe following function definition appearing in the value of any\nenvironmental variable passed to bash 4.2 or 4.3 will lead to\nstraightforward put-your-command-here RCE (again, provided that the\ntargeted instance is not protected with Florian\u0027s patch):\n\n() { _; } \u003e_[$($())] { echo hi mom; id; }\n\nA complete example looks like this:\n\nHTTP_COOKIE=\u0027() { _; } \u003e_[$($())] { echo hi mom; id; }\u0027 bash -c :\n\n...or:\n\nGET /some/script.cgi HTTP/1.0\nUser-Agent: () { _; } \u003e_[$($())] { id \u003e/tmp/hi_mom; }\n\nNote that the PoC does not work as-is in more ancient versions of\nbash, such as 2.x or 3.x; it might have been introduced with\nxparse_dolparen() starting with bash 4.2 patch level 12 few years\nback, but I have not investigated this in a lot of detail. Florian\u0027s\npatch is strongly recommended either way. \n\nThe attack surface through which this flaw may be triggered is roughly\nsimilar to that for CVE-2014-6277 and the original bash bug [6]. \n\n== Additional info ==\n\nBoth of these issues were identified in an automated fashion with\namerican fuzzy lop:\n\nhttps://code.google.com/p/american-fuzzy-lop\n\nThe out-of-the-box fuzzer was seeded with a minimal valid function\ndefinition (\"() { foo() { foo; }; \u003ebar; }\") and allowed to run for a\ncouple of hours on a single core. \n\nIn addition to the issues discussed above, the fuzzer also hit three\nof the four previously-reported CVEs. \n\nI initially shared the findings privately with vendors, but because of\nthe intense scrutiny that this codebase is under, the ease of\nreproducing these results with an open-source fuzzer, and the\nnow-broad availability of upstream mitigations, there seems to be\nrelatively little value in continued secrecy. \n\n== References ==\n\n[1] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-025\n[2] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-026\n[3] http://www.openwall.com/lists/oss-security/2014/09/25/13\n[4] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027\n[5] http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html\n[6] http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\n[7] http://www.pcworld.com/article/2688932/improved-patch-tackles-new-shellshock-attack-vectors.html\n\nPS. There are no other bugs in bash. \n\n--------- FOLLOW UP -----------\n\nDate: Wed, 01 Oct 2014 07:32:57 -0700\nFrom fulldisclosure-bounces@seclists.org Wed Oct 1 14:37:33 2014\nFrom: Paul Vixie \u003cpaul@redbarn.org\u003e\nTo: Michal Zalewski \u003clcamtuf@coredump.cx\u003e\nCc: \"fulldisclosure@seclists.org\" \u003cfulldisclosure@seclists.org\u003e\nSubject: Re: [FD] the other bash RCEs (CVE-2014-6277 and CVE-2014-6278)\n\nmichal, thank you for your incredibly informative report here. i have a\nminor correction. \n\n\u003e Michal Zalewski \u003cmailto:lcamtuf@coredump.cx\u003e\n\u003e Wednesday, October 01, 2014 7:21 AM\n\u003e ... \n\u003e\n\u003e Note: over the past few days, Florian\u0027s patch has been picked up by\n\u003e major Linux distros (Red Hat, Debian, SUSE, etc), so there is a\n\u003e reasonable probability that you are in good shape. To test, execute\n\u003e this command from within a bash shell:\n\u003e\n\u003e foo=\u0027() { echo not patched; }\u0027 bash -c foo\n\nthis command need not be executed from within bash. the problem occurs\nwhen bash is run by the command, and the shell that runs the command can\nbe anything. for example, on a system where i have deliberately not\npatched bash, where sh is \"ash\" (almquist shell):\n\n\u003e $ foo=\u0027() { echo not patched; }\u0027 bash -c foo\n\u003e not patched \n\nhere\u0027s me testing it from within tcsh:\n\n\u003e % env foo=\u0027() { echo not patched; }\u0027 bash -c foo\n\u003e not patched\n\u003e % (setenv foo \u0027() { echo not patched; }\u0027; bash -c foo)\n\u003e not patched\n\nthis is a minor issue, but i\u0027ve found in matters of security bug\nreports, tests, and discussions, that any minor matter can lead to deep\nmisunderstanding. \n\nthanks again for your excellent report, and your continuing work on this\nissue. \n\nvixie\n\n. \n\nOpen the PXE Configuration Utility on the HP Insight Control server\ndeployment window\nSelect Linux Managed from the Boot Menu options\nClick the Edit button. Clicking the Edit button displays the Edit Shared Menu\nOption window\nUncheck the x86 option in Operating System and Processor Options and click\nOK. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04512907\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04512907\nVersion: 1\n\nHPSBMU03217 rev.1 - HP Vertica Analytics Platform running Bash Shell, Remote\nCode Execution\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-12-16\nLast Updated: 2014-12-16\n\nPotential Security Impact: Remote code execution\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP Vertica. \n\nReferences:\n\nCVE-2014-6271\nCVE-2014-6277\nCVE-2014-6278\nCVE-2014-7169\nCVE-2014-7186\nCVE-2014-7187\nSSRT101827\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nHP Vertica AMI\u0027s and Virtual Machines prior to v7.1.1-0. \n\nBACKGROUND\n\nHP Vertica AMI\u0027s and Virtual Machines prior to v7.1.1-0 include a vulnerable\nversion of the Bash shell. \n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2104-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2104-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nWe recommend installing Vertica v7.1.1-0 or subsequent, or manually\ninstalling a new version of Bash, such as Bash43-027. \n\nHP has released the following updates to resolve this vulnerability for HP\nVertica products. \n\nUpdate to the latest VM image available at: https://my.vertica.com\n\nFor customers using the AMI version HP Vertica Analytics platform, please\ninstall the latest image available at Amazon. \n\nHISTORY\nVersion:1 (rev.1) - 16 December 2014 Initial release\n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being\ncommunicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletins\nvia Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\n\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n - check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n - verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile\nto update appropriate sections. \n\nTo review previously published Security Bulletins visit:\nhttp://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin relates to is\nrepresented by the 5th and 6th characters of the Bulletin number in the\ntitle: GN = HP General SW\n MA = HP Management Agents\n MI = Misc. 3rd Party SW\n\nMP = HP MPE/iX\n NS = HP NonStop Servers\n OV = HP OpenVMS\n\nPI = HP Printing \u0026 Imaging\n ST = HP Storage SW\n TL = HP Trusted Linux\n\nTU = HP Tru64 UNIX\n UX = HP-UX\n VV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to\nmaintain system integrity. HP is continually reviewing and enhancing the\nsecurity features of software products to provide customers with current\nsecure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the\nattention of users of the affected HP products the important security\ninformation contained in this Bulletin. HP recommends that all users\ndetermine the applicability of this information to their individual\nsituations and take appropriate action. HP does not warrant that this\ninformation is necessarily accurate or complete for all user situations and,\nconsequently, HP will not be responsible for any damages resulting from\nuser\u0027s use or disregard of the information provided in this Bulletin. To the\nextent permitted by law, HP disclaims all warranties, either express or\nimplied, including the warranties of merchantability and fitness for a\nparticular purpose, title and non-infringement.\"\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \n\nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for incidental,\nspecial or consequential damages including downtime cost; lost profits;\ndamages relating to the procurement of substitute products or services; or\ndamages for loss of data, or software restoration. The information in this\ndocument is subject to change without notice. Hewlett-Packard Company and the\nnames of Hewlett-Packard products referenced herein are trademarks of\nHewlett-Packard Company in the United States and other countries. Other\nproduct and company names mentioned herein may be trademarks of their\nrespective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlSQq8cACgkQ4B86/C0qfVnhRQCeLX48R9EljRJ6FS+FOzGvUTZK\ntBsAnjZjWjJ7/Ua7ykToRbGpQQeKVZEW\n=Xllu\n-----END PGP SIGNATURE-----\n. \nNote: All versions of HP Thin Pro and HP Smart Zero Core operating systems\nprior to version 5.1.0 are affected by these vulnerabilities. Following is a\ncomplete list of affected operating systems and Hardware Platforms Affected. \n\nProduct Affected\n Product Versions\n Patch Status\n\nHP ThinPro and HP Smart Zero Core (X86)\n v5.1.0 and above\n No update required; the Bash shell patch is incorporated into the base\nimage. \n\nNote: If you participated in the ThinPro 5.1.0 beta program then upgrade to\nthe release version as soon as it becomes available. \n\nHP ThinPro and HP Smart Zero Core (x86)\n v5.0.x\n A component update is currently available through Easy Update as:\nSecurityUpdate-Shellshock-2.0-all-5.0-x86.xar . \n\nThe update can be also downloaded directly from HP as part of softpaq sp69382\nat the following address:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe\n\nHP ThinPro and HP Smart Zero Core (x86)\n v4.4.x\n A component update is currently available through Easy Update as:\nSecurityUpdate-Shellshock-2.0-all-4.4-x86.xar . \n\nThe update can be also downloaded directly from HP as part of softpaq sp69382\nat the following address:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe\n\nHP ThinPro and HP Smart Zero Core (ARM)\n v4.4.x\n A component update is currently available through Easy Update as:\nSecurityUpdate-Shellshock-2.0-all-4.4-arm.xar . \n\nThe update can be also downloaded directly from HP as part of softpaq sp69382\nat the following address:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe\n\nHP ThinPro and HP Smart Zero Core (X86)\n v4.1, v4.2, and v4.3\n A component update is currently available through Easy Update as:\nSecurityUpdate-Shellshock-2.0-all-4.1-4.2-4.3-x86.xar . \n\nThe update can be also downloaded directly from HP as part of softpaq sp69382\nat the following address:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe\n\nHP ThinPro and HP Smart Zero Core (ARM)\n v4.1, v4.2, and v4.3\n A component update is currently available through Easy Update as:\nSecurityUpdate-Shellshock-2.0-all-4.1-4.2-4.3-arm.xar . \n\nThe update can be also downloaded directly from HP as part of softpaq sp69382\nat the following address:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe\n\nHP ThinPro and HP Smart Zero Core (X86)\n v3.1, v3.2, and v3.3\n Download softpaq sp69382 from:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe which contains an\nupdate package as: bash_4.1-3+deb6u2_i386.deb . \n\nHP ThinPro and HP Smart Zero Core (ARM)\n v3.1, v3.2, and v3.3\n Download softpaq sp69382 from:\nftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe which contains an\nupdate package as: bash_4.1-3+deb6u2_armel.deb . \n\nHP ThinPro and HP Smart Zero Core\n v2.x and earlier\n An update will be made available for customers upon request\n\nHISTORY\nVersion:1 (rev.1) - 03 October 2014 Initial release\nVersion:2 (rev.2) - 06 November 2014 Updated List of CVEs, Updated impacted\nproducts, Updated resolution table\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com", "sources": [ { "db": "NVD", "id": "CVE-2014-6277" }, { "db": "JVNDB", "id": "JVNDB-2014-004431" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "CERT/CC", "id": "VU#252743" }, { "db": "BID", "id": "70165" }, { "db": "PACKETSTORM", "id": "128764" }, { "db": "PACKETSTORM", "id": "128606" }, { "db": "PACKETSTORM", "id": "128753" }, { "db": "PACKETSTORM", "id": "130988" }, { "db": "VULMON", "id": "CVE-2014-6277" }, { "db": "PACKETSTORM", "id": "129070" }, { "db": "PACKETSTORM", "id": "128520" }, { "db": "PACKETSTORM", "id": "128666" }, { "db": "PACKETSTORM", "id": "129095" }, { "db": "PACKETSTORM", "id": "128762" }, { "db": "PACKETSTORM", "id": "130335" }, { "db": "PACKETSTORM", "id": "129617" }, { "db": "PACKETSTORM", "id": "129068" } ], "trust": 4.5 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=35081", "trust": 0.3, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-6277" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-6277", "trust": 5.6 }, { "db": "JVN", "id": "JVN55667175", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2014-000126", "trust": 2.7 }, { "db": "CERT/CC", "id": "VU#252743", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU97219505", "trust": 1.6 }, { "db": "JVN", "id": "JVNVU97220341", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2014-004431", "trust": 1.6 }, { "db": "SECUNIA", "id": "60325", "trust": 1.1 }, { "db": "SECUNIA", "id": "61065", "trust": 1.1 }, { "db": "SECUNIA", "id": "61780", "trust": 1.1 }, { "db": "SECUNIA", "id": "61603", "trust": 1.1 }, { "db": "SECUNIA", "id": "61287", "trust": 1.1 }, { "db": "SECUNIA", "id": "61643", "trust": 1.1 }, { "db": "SECUNIA", "id": "60433", "trust": 1.1 }, { "db": "SECUNIA", "id": "61565", "trust": 1.1 }, { "db": "SECUNIA", "id": "61312", "trust": 1.1 }, { "db": "SECUNIA", "id": "61703", "trust": 1.1 }, { "db": "SECUNIA", "id": "61503", "trust": 1.1 }, { "db": "SECUNIA", "id": "60034", "trust": 1.1 }, { "db": "SECUNIA", "id": "60044", "trust": 1.1 }, { "db": "SECUNIA", "id": "61328", "trust": 1.1 }, { "db": "SECUNIA", "id": "59907", "trust": 1.1 }, { "db": "SECUNIA", "id": "61129", "trust": 1.1 }, { "db": "SECUNIA", "id": "60024", "trust": 1.1 }, { "db": "SECUNIA", "id": "59961", "trust": 1.1 }, { "db": "SECUNIA", "id": "61633", "trust": 1.1 }, { "db": "SECUNIA", "id": "61128", "trust": 1.1 }, { "db": "SECUNIA", "id": "61313", "trust": 1.1 }, { "db": "SECUNIA", "id": "60055", "trust": 1.1 }, { "db": "SECUNIA", "id": "61291", "trust": 1.1 }, { "db": "SECUNIA", "id": "62343", "trust": 1.1 }, { "db": "SECUNIA", "id": "61641", "trust": 1.1 }, { "db": "SECUNIA", "id": "61857", "trust": 1.1 }, { "db": "SECUNIA", "id": "61816", "trust": 1.1 }, { "db": "SECUNIA", "id": "62312", "trust": 1.1 }, { "db": "SECUNIA", "id": "60193", "trust": 1.1 }, { "db": "SECUNIA", "id": "60063", "trust": 1.1 }, { "db": "SECUNIA", "id": "58200", "trust": 1.1 }, { "db": "SECUNIA", "id": "61654", "trust": 1.1 }, { "db": "SECUNIA", "id": "61550", "trust": 1.1 }, { "db": "SECUNIA", "id": "61283", "trust": 1.1 }, { "db": "SECUNIA", "id": "61485", "trust": 1.1 }, { "db": "SECUNIA", "id": "61471", "trust": 1.1 }, { "db": "SECUNIA", "id": "61442", "trust": 1.1 }, { "db": "SECUNIA", "id": "61552", "trust": 1.1 }, { "db": "MCAFEE", "id": "SB10085", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "128567", "trust": 1.1 }, { "db": "JUNIPER", "id": "JSA10648", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU96447236", "trust": 0.8 }, { "db": "USCERT", "id": "TA14-268A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004433", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004476", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004399", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004410", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004432", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-14-269-01A", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-15-344-01", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201409-1037", "trust": 0.6 }, { "db": "BID", "id": "70165", "trust": 0.3 }, { "db": "EXPLOIT-DB", "id": "35081", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2014-6277", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128764", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128606", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128753", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130988", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129068", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129070", "trust": 0.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/09/25/13", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128520", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128666", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129095", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128762", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130335", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129617", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "VULMON", "id": "CVE-2014-6277" }, { "db": "BID", "id": "70165" }, { "db": "JVNDB", "id": "JVNDB-2014-004431" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "PACKETSTORM", "id": "128764" }, { "db": "PACKETSTORM", "id": "128606" }, { "db": "PACKETSTORM", "id": "128753" }, { "db": "PACKETSTORM", "id": "130988" }, { "db": "PACKETSTORM", "id": "129068" }, { "db": "PACKETSTORM", "id": "129070" }, { "db": "PACKETSTORM", "id": "128520" }, { "db": "PACKETSTORM", "id": "128666" }, { "db": "PACKETSTORM", "id": "129095" }, { "db": "PACKETSTORM", "id": "128762" }, { "db": "PACKETSTORM", "id": "130335" }, { "db": "PACKETSTORM", "id": "129617" }, { "db": "CNNVD", "id": "CNNVD-201409-1037" }, { "db": "NVD", "id": "CVE-2014-6277" } ] }, "id": "VAR-201409-0366", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.3212341 }, "last_update_date": "2024-09-17T21:12:30.771000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NAS-201410-05", "trust": 1.6, "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "title": "APPLE-SA-2015-01-27-4", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "title": "APPLE-SA-2015-09-30-3 OS X El Capitan 10.11", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "title": "HT205267", "trust": 0.8, "url": "https://support.apple.com/en-us/HT205267" }, { "title": "HT204244", "trust": 0.8, "url": "http://support.apple.com/en-us/HT204244" }, { "title": "HT204244", "trust": 0.8, "url": "http://support.apple.com/ja-jp/HT204244" }, { "title": "HT205267", "trust": 0.8, "url": "http://support.apple.com/ja-jp/HT205267" }, { "title": "bash-3.2-33.AXS3.4 ", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=3918" }, { "title": "bash-4.1.2-15.AXS4.2 ", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=3919" }, { "title": "cisco-sa-20140926-bash", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "title": "CTX200223", "trust": 0.8, "url": "https://support.citrix.com/article/CTX200223" }, { "title": "CTX200217", "trust": 0.8, "url": "https://support.citrix.com/article/CTX200217" }, { "title": "GNU Bash", "trust": 0.8, "url": "http://www.gnu.org/software/bash/" }, { "title": "HPSBMU03143 SSRT101761", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479536" }, { "title": "HPSBMU03246 SSRT101743", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04558068" }, { "title": "HPSBMU03182 SSRT101787", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04497042" }, { "title": "HPSBST03122 SSRT101717", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04471532" }, { "title": "HPSBMU03144 SSRT101762", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479492" }, { "title": "HPSBST03154 SSRT101747", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04487558" }, { "title": "HPSBHF03125 SSRT101724", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04471538" }, { "title": "HPSBST03129 SSRT101760", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04478866" }, { "title": "HPSBST03181 SSRT101811", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04496383" }, { "title": "HPSBGN03233", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04540692" }, { "title": "HPSBGN03138 SSRT101755", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04475942" }, { "title": "HPSBGN03142 SSRT101764", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479402" }, { "title": "HPSBST03155 SSRT101747", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04487573" }, { "title": "HPSBMU03217 SSRT101827", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04512907" }, { "title": "HPSBGN03141 SSRT101763", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479398" }, { "title": "HPSBMU03165 SSRT101783", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04497075" }, { "title": "HPSBMU03220 SSRT101819", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04518183" }, { "title": "HPSBHF03146 SSRT101765", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479601" }, { "title": "HPSBST03157 SSRT101718", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04488200" }, { "title": "HPSBMU03236 SSRT101830", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04552143" }, { "title": "HPSBHF03145 SSRT101765", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04479505" }, { "title": "HPSBMU03245 SSRT101742", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c04556845" }, { "title": "1685604", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "title": "1685541", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "title": "1685914", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "title": "S1004915", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "title": "1685733", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "title": "1685749", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "title": "1686131", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "title": "T1021279", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "title": "MIGR-5096315", "trust": 0.8, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "title": "S1004897", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "title": "1685433", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685433" }, { "title": "T1021272", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "title": "S1004898", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "title": "1685522", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685522" }, { "title": "S1004879", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "title": "1686479", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "title": "1686493", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686493" }, { "title": "1686299", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686299" }, { "title": "1686635", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686635" }, { "title": "1685798", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685798" }, { "title": "\u30a2\u30e9\u30a4\u30c9\u30c6\u30ec\u30b7\u30b9\u682a\u5f0f\u4f1a\u793e\u304b\u3089\u306e\u60c5\u5831", "trust": 0.8, "url": "http://jvn.jp/vu/JVNVU97219505/522154/index.html" }, { "title": "OES11 SP2, OES11SP1, OES2 SP3 vulnerability with GNU Bash Remote Code Execution (aka ShellShock) and Mozilla NSS vulnerabilities", "trust": 0.8, "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "title": "ZENworks Configuration Management vulnerability with GNU Bash Remote Code Execution (aka ShellShock)", "trust": 0.8, "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "title": "AV14-003", "trust": 0.8, "url": "http://jpn.nec.com/security-info/av14-003.html" }, { "title": "ShellShock 101 - What you need to know and do, to ensure your systems are secure", "trust": 0.8, "url": "https://www.suse.com/support/shellshock/" }, { "title": "ELSA-2014-3093", "trust": 0.8, "url": "http://linux.oracle.com/errata/ELSA-2014-3093" }, { "title": "ELSA-2014-3094", "trust": 0.8, "url": "http://linux.oracle.com/errata/ELSA-2014-3094" }, { "title": "Bash \"Shellshock\" Vulnerabilities - CVE-2014-7169", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "title": "Bug 1141597", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "title": "Resolution for Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271, CVE-2014-7169) in Red Hat Enterprise Linux", "trust": 0.8, "url": "https://access.redhat.com/solutions/1207723" }, { "title": "Bash specially-crafted environment variables code injection attack", "trust": 0.8, "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" }, { "title": "GNU Bash \u300cOS \u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u300d\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066 ", "trust": 0.8, "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU252743.html" }, { "title": "SA82", "trust": 0.8, "url": "https://bto.bluecoat.com/security-advisory/sa82" }, { "title": "SOL15629", "trust": 0.8, "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "title": "Multiple vulnerabilities in Bash", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash" }, { "title": "JSA10648", "trust": 0.8, "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648" }, { "title": "VMSA-2014-0010", "trust": 0.8, "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "title": "GNU bash \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u5f0a\u793e\u8abf\u67fb\u30fb\u5bfe\u5fdc\u72b6\u6cc1\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.iodata.jp/support/information/2014/bash/" }, { "title": "bash\u306e\u8106\u5f31\u6027(CVE-2014-6271,CVE-2014-7169 \u4ed6)\u306b\u3088\u308bHA8500\u3078\u306e\u5f71\u97ff\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/bash_ha8500.html" }, { "title": "\u30b5\u30fc\u30d0\u30fb\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u88fd\u54c1 bash\u306e\u8106\u5f31\u6027(CVE-2014-6271,CVE-2014-7169\u4ed6)\u306b\u3088\u308b\u5f71\u97ff\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/bash_cve20146271.html" }, { "title": "cisco-sa-20140926-bash", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/JP/112/1126/1126247_cisco-sa-20140926-bash-j.html" }, { "title": "GNU Bash\u306b\u304a\u3051\u308bOS\u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "http://buffalo.jp/support_s/s20141002.html" }, { "title": "TLSA-2014-10", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2014/TLSA-2014-10j.html" }, { "title": "GNU Bash \u306b OS \u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/jvn-97219505.html" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2014-6277" }, { "title": "Ubuntu Security Notice: bash vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2380-1" }, { "title": "VMware Security Advisories: VMware product updates address critical Bash security vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=86cb6b3955e100fdc9667a7ca916c772" }, { "title": "Symantec Security Advisories: SA82 : GNU Bash Shellshock Command Injection Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=2b57ceaadfde2a8b03482273e1fd21ea" }, { "title": "Apple: OS X Yosemite v10.10.2 and Security Update 2015-001", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=64cbe709a7be49c91d8a8b0f43621640" }, { "title": "Tenable Security Advisories: [R7] Tenable Appliance Affected by GNU bash \u0027Shellshock\u0027 Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2014-07" }, { "title": "Citrix Security Bulletins: Citrix XenServer Shellshock Security Update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=64ae0aae8269062686789e3a3fa1d2bf" }, { "title": "Citrix Security Bulletins: Citrix Security Advisory for GNU Bash Shellshock Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=73443a6db89dc66fc6bcb49f85bfd1ab" }, { "title": "Apple: OS X El Capitan v10.11", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=e88bab658248444f5dffc23fd95859e7" }, { "title": "patch-bash-shellshock", "trust": 0.1, "url": "https://github.com/jdauphant/patch-bash-shellshock " }, { "title": "macosx-bash-92-shellshock-patched", "trust": 0.1, "url": "https://github.com/ido/macosx-bash-92-shellshock-patched " }, { "title": "w-test", "trust": 0.1, "url": "https://github.com/inspirion87/w-test " }, { "title": "shellshockFixOSX", "trust": 0.1, "url": "https://github.com/opragel/shellshockFixOSX " }, { "title": "shocktrooper", "trust": 0.1, "url": "https://github.com/EvanK/shocktrooper " }, { "title": "ShellShockHunter", "trust": 0.1, "url": "https://github.com/MrCl0wnLab/ShellShockHunter " }, { "title": "Xpl-SHELLSHOCK-Ch3ck", "trust": 0.1, "url": "https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck " }, { "title": "bashcheck", "trust": 0.1, "url": "https://github.com/hannob/bashcheck " }, { "title": "shellshocker-pocs", "trust": 0.1, "url": "https://github.com/mubix/shellshocker-pocs " }, { "title": "LinuxFlaw", "trust": 0.1, "url": "https://github.com/mudongliang/LinuxFlaw " }, { "title": "afl-cve", "trust": 0.1, "url": "https://github.com/mrash/afl-cve " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/researcher-takes-wraps-off-two-undisclosed-shellshock-vulnerabilities-in-bash/108674/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-6277" }, { "db": "JVNDB", "id": "JVNDB-2014-004431" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.8 }, { "problemtype": "OS Command injection (CWE-78) [IPA evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004431" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "NVD", "id": "CVE-2014-6277" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html" }, { "trust": 1.9, "url": "https://kb.bluecoat.com/index?page=content\u0026id=sa82" }, { "trust": 1.9, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash" }, { "trust": 1.9, "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "trust": 1.9, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10085" }, { "trust": 1.9, "url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000126" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/252743" }, { "trust": 1.6, "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" }, { "trust": 1.6, "url": "http://www.ipa.go.jp/security/ciadr/vul/20140926-bash.html" }, { "trust": 1.6, "url": "http://jvn.jp/jp/jvn55667175/index.html" }, { "trust": 1.6, "url": "http://jvn.jp/vu/jvnvu97219505/index.html" }, { "trust": 1.6, "url": "http://jvn.jp/vu/jvnvu97220341/index.html" }, { "trust": 1.6, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6277" }, { "trust": 1.2, "url": "http://www.ubuntu.com/usn/usn-2380-1" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6277" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6278" }, { "trust": 1.1, "url": "https://www.suse.com/support/shellshock/" }, { "trust": 1.1, "url": "http://support.novell.com/security/cve/cve-2014-6277.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61641" }, { "trust": 1.1, "url": "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61485" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59907" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61654" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61565" }, { "trust": 1.1, "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "trust": 1.1, "url": "http://www.vmware.com/security/advisories/vmsa-2014-0010.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61643" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61503" }, { "trust": 1.1, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10648" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61633" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61552" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61703" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61283" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61603" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2" }, { "trust": 1.1, "url": "https://support.citrix.com/article/ctx200217" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60034" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61816" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61128" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61313" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61442" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61287" }, { "trust": 1.1, "url": "https://support.citrix.com/article/ctx200223" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60055" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61129" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61780" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "trust": 1.1, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61471" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61328" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915" }, { "trust": 1.1, "url": "http://secunia.com/advisories/58200" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61857" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60193" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61065" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61550" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60325" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61312" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60063" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61291" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60044" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "trust": 1.1, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityalerts" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60433" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60024" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2" }, { "trust": 1.1, "url": "http://jvn.jp/en/jp/jvn55667175/index.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2" }, { "trust": 1.1, "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62312" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59961" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62343" }, { "trust": 1.1, "url": "http://linux.oracle.com/errata/elsa-2014-3093" }, { "trust": 1.1, "url": "http://linux.oracle.com/errata/elsa-2014-3094" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html" }, { "trust": 1.1, "url": "http://support.apple.com/ht204244" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142289270617409\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2015:164" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html" }, { "trust": 1.1, "url": "https://support.apple.com/ht205267" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-c04518183" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-c04497075" }, { "trust": 1.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6271" }, { "trust": 1.0, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7169" }, { "trust": 0.9, "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "trust": 0.9, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.9, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7186" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7187" }, { "trust": 0.8, "url": "http://seclists.org/oss-sec/2014/q3/650" }, { "trust": 0.8, "url": "https://access.redhat.com/articles/1200223" }, { "trust": 0.8, "url": "http://seclists.org/oss-sec/2014/q3/688" }, { "trust": 0.8, "url": "http://seclists.org/oss-sec/2014/q3/685" }, { "trust": 0.8, "url": "https://gist.github.com/anonymous/929d622f3b36b00c0be1" }, { "trust": 0.8, "url": "https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html" }, { "trust": 0.8, "url": "https://shellshocker.net/#" }, { "trust": 0.8, "url": "http://support.apple.com/kb/ht6495" }, { "trust": 0.8, "url": "https://www.barracuda.com/support/techalerts" }, { "trust": 0.8, "url": "http://www.checkpoint.com/blog/protecting-shellshock/index.html" }, { "trust": 0.8, "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044" }, { "trust": 0.8, "url": "https://www.debian.org/security/2014/dsa-3032" }, { "trust": 0.8, "url": "http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf" }, { "trust": 0.8, "url": "http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/" }, { "trust": 0.8, "url": "http://www.fortiguard.com/advisory/fg-ir-14-030/" }, { "trust": 0.8, "url": "http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml" }, { "trust": 0.8, "url": "http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0" }, { "trust": 0.8, "url": "http://kb.juniper.net/jsa10648" }, { "trust": 0.8, "url": "http://jpn.nec.com/security-info/av14-003.html" }, { "trust": 0.8, "url": "http://support.novell.com/security/cve/cve-2014-6271.html" }, { "trust": 0.8, "url": "https://www.suse.com/support/kb/doc.php?id=7015702" }, { "trust": 0.8, "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.522193" }, { "trust": 0.8, "url": "http://www.ubuntu.com/usn/usn-2362-1/" }, { "trust": 0.8, "url": "http://kb.vmware.com/selfservice/microsites/search.do?language=en_us\u0026cmd=displaykc\u0026externalid=2090740" }, { "trust": 0.8, "url": "http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6277" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2014/at140037.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96447236/index.html" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ncas/alerts/ta14-268a" }, { "trust": 0.8, "url": "http://lcamtuf.blogspot.jp/2014/09/bash-bug-apply-unofficial-patch-now.html" }, { "trust": 0.8, "url": "http://www.aratana.jp/security/detail.php?id=10" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004399.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004410.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004431.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004476.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004432.html" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004433.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7169" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6271" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6278" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7186" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7187" }, { "trust": 0.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-344-01" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2104-6277" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2104-6278" }, { "trust": 0.3, "url": "http://www.gnu.org/software/bash/" }, { "trust": 0.3, "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/35081/" }, { "trust": 0.1, "url": "https://security.archlinux.org/cve-2014-6277" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2380-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0224" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.6" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.5" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.5" }, { "trust": 0.1, "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse" }, { "trust": 0.1, "url": "http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-026" }, { "trust": 0.1, "url": "http://www.pcworld.com/article/2688932/improved-patch-tackles-new-shellshock-attack-vectors.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6279" }, { "trust": 0.1, "url": "https://code.google.com/p/american-fuzzy-lop" }, { "trust": 0.1, "url": "http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027" }, { "trust": 0.1, "url": "http://www.openwall.com/lists/oss-security/2014/09/25/13" }, { "trust": 0.1, "url": "http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-025" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/km01194259" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/cki/secbullarchive.do" }, { "trust": 0.1, "url": "https://my.vertica.com" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/subsignin.php" } ], "sources": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "VULMON", "id": "CVE-2014-6277" }, { "db": "BID", "id": "70165" }, { "db": "JVNDB", "id": "JVNDB-2014-004431" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "PACKETSTORM", "id": "128764" }, { "db": "PACKETSTORM", "id": "128606" }, { "db": "PACKETSTORM", "id": "128753" }, { "db": "PACKETSTORM", "id": "130988" }, { "db": "PACKETSTORM", "id": "129068" }, { "db": "PACKETSTORM", "id": "129070" }, { "db": "PACKETSTORM", "id": "128520" }, { "db": "PACKETSTORM", "id": "128666" }, { "db": "PACKETSTORM", "id": "129095" }, { "db": "PACKETSTORM", "id": "128762" }, { "db": "PACKETSTORM", "id": "130335" }, { "db": "PACKETSTORM", "id": "129617" }, { "db": "CNNVD", "id": "CNNVD-201409-1037" }, { "db": "NVD", "id": "CVE-2014-6277" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#252743" }, { "db": "VULMON", "id": "CVE-2014-6277" }, { "db": "BID", "id": "70165" }, { "db": "JVNDB", "id": "JVNDB-2014-004431" }, { "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "db": "PACKETSTORM", "id": "128764" }, { "db": "PACKETSTORM", "id": "128606" }, { "db": "PACKETSTORM", "id": "128753" }, { "db": "PACKETSTORM", "id": "130988" }, { "db": "PACKETSTORM", "id": "129068" }, { "db": "PACKETSTORM", "id": "129070" }, { "db": "PACKETSTORM", "id": "128520" }, { "db": "PACKETSTORM", "id": "128666" }, { "db": "PACKETSTORM", "id": "129095" }, { "db": "PACKETSTORM", "id": "128762" }, { "db": "PACKETSTORM", "id": "130335" }, { "db": "PACKETSTORM", "id": "129617" }, { "db": "CNNVD", "id": "CNNVD-201409-1037" }, { "db": "NVD", "id": "CVE-2014-6277" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-09-25T00:00:00", "db": "CERT/CC", "id": "VU#252743" }, { "date": "2014-09-27T00:00:00", "db": "VULMON", "id": "CVE-2014-6277" }, { "date": "2014-09-27T00:00:00", "db": "BID", "id": "70165" }, { "date": "2014-09-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004431" }, { "date": "2014-10-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "date": "2014-10-20T17:57:00", "db": "PACKETSTORM", "id": "128764" }, { "date": "2014-10-09T23:44:16", "db": "PACKETSTORM", "id": "128606" }, { "date": "2014-10-20T13:55:00", "db": "PACKETSTORM", "id": "128753" }, { "date": "2015-03-24T17:07:02", "db": "PACKETSTORM", "id": "130988" }, { "date": "2014-11-12T18:13:39", "db": "PACKETSTORM", "id": "129068" }, { "date": "2014-11-12T18:13:53", "db": "PACKETSTORM", "id": "129070" }, { "date": "2014-10-01T23:55:55", "db": "PACKETSTORM", "id": "128520" }, { "date": "2014-10-14T23:07:16", "db": "PACKETSTORM", "id": "128666" }, { "date": "2014-11-13T17:15:31", "db": "PACKETSTORM", "id": "129095" }, { "date": "2014-10-20T17:44:00", "db": "PACKETSTORM", "id": "128762" }, { "date": "2015-02-10T17:43:19", "db": "PACKETSTORM", "id": "130335" }, { "date": "2014-12-17T18:27:35", "db": "PACKETSTORM", "id": "129617" }, { "date": "2014-09-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201409-1037" }, { "date": "2014-09-27T22:55:02.660000", "db": "NVD", "id": "CVE-2014-6277" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-14T00:00:00", "db": "CERT/CC", "id": "VU#252743" }, { "date": "2018-08-09T00:00:00", "db": "VULMON", "id": "CVE-2014-6277" }, { "date": "2015-10-26T16:51:00", "db": "BID", "id": "70165" }, { "date": "2015-12-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004431" }, { "date": "2024-07-18T02:27:00", "db": "JVNDB", "id": "JVNDB-2014-000126" }, { "date": "2014-09-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201409-1037" }, { "date": "2018-08-09T01:29:01.437000", "db": "NVD", "id": "CVE-2014-6277" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201409-1037" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GNU Bash shell executes commands in exported functions in environment variables", "sources": [ { "db": "CERT/CC", "id": "VU#252743" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201409-1037" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.