Vulnerability Description
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Bash | 1.14.0 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN55667175/index.htmlThird Party Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126Third Party Advisory
- http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.htmlPatchThird Party Advisory
- http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.htmlThird Party Advisory
- http://linux.oracle.com/errata/ELSA-2014-3093Third Party Advisory
- http://linux.oracle.com/errata/ELSA-2014-3094Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.htmlMailing List
- http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.htmlMailing List
- http://marc.info/?l=bugtraq&m=141330468527613&w=2Third Party Advisory
- http://marc.info/?l=bugtraq&m=141345648114150&w=2Third Party Advisory
- http://marc.info/?l=bugtraq&m=141383026420882&w=2Third Party Advisory
- http://marc.info/?l=bugtraq&m=141383081521087&w=2Third Party Advisory
- http://marc.info/?l=bugtraq&m=141383196021590&w=2Third Party Advisory
- http://marc.info/?l=bugtraq&m=141383244821813&w=2Third Party Advisory
- http://marc.info/?l=bugtraq&m=141383304022067&w=2Third Party Advisory
FAQ
What is CVE-2014-6278?
CVE-2014-6278 is a vulnerability with a CVSS score of 8.8 (HIGH). GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environme...
How severe is CVE-2014-6278?
CVE-2014-6278 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6278?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Bash.