CRITICAL · 9.8

CVE-2014-6271

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as...

Vulnerability Description

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
GnuBash<= 4.3
AristaEos>= 4.9.0, < 4.9.12
OracleLinux4
QnapQts< 4.1.1
MageiaMageia3.0
RedhatGluster Storage Server For On-Premise2.1
RedhatVirtualization3.4
RedhatEnterprise Linux4.0
RedhatEnterprise Linux Desktop5.0
RedhatEnterprise Linux Eus5.9
RedhatEnterprise Linux For Ibm Z Systems5.9_s390x
RedhatEnterprise Linux For Power Big Endian5.0_ppc
RedhatEnterprise Linux For Power Big Endian Eus6.5_ppc64
RedhatEnterprise Linux For Scientific Computing6.0
RedhatEnterprise Linux Server5.0
RedhatEnterprise Linux Server Aus5.6
RedhatEnterprise Linux Server From Rhui5.0
RedhatEnterprise Linux Server Tus6.5
RedhatEnterprise Linux Workstation5.0
SuseStudio Onsite1.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-6271?

CVE-2014-6271 is a vulnerability with a CVSS score of 9.8 (CRITICAL). GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as...

How severe is CVE-2014-6271?

CVE-2014-6271 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2014-6271?

Check the references section above for vendor advisories and patch information. Affected products include: Gnu Bash, Arista Eos, Oracle Linux, Qnap Qts, Mageia Mageia.