First published: Sat Sep 27 2014(Updated: )
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Bash | =1.14.0 | |
GNU Bash | =1.14.1 | |
GNU Bash | =1.14.2 | |
GNU Bash | =1.14.3 | |
GNU Bash | =1.14.4 | |
GNU Bash | =1.14.5 | |
GNU Bash | =1.14.6 | |
GNU Bash | =1.14.7 | |
GNU Bash | =2.0 | |
GNU Bash | =2.01 | |
GNU Bash | =2.01.1 | |
GNU Bash | =2.02 | |
GNU Bash | =2.02.1 | |
GNU Bash | =2.03 | |
GNU Bash | =2.04 | |
GNU Bash | =2.05 | |
GNU Bash | =2.05-a | |
GNU Bash | =2.05-b | |
GNU Bash | =3.0 | |
GNU Bash | =3.0.16 | |
GNU Bash | =3.1 | |
GNU Bash | =3.2 | |
GNU Bash | =3.2.48 | |
GNU Bash | =4.0 | |
GNU Bash | =4.0-rc1 | |
GNU Bash | =4.1 | |
GNU Bash | =4.2 | |
GNU Bash | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6277 is classified as a critical vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2014-6277, update GNU Bash to version 4.3 or later.
All versions of GNU Bash prior to 4.3 are affected by CVE-2014-6277.
CVE-2014-6277 can enable remote attackers to execute arbitrary code or create denial of service conditions.
Yes, CVE-2014-6277 is exploitable through improperly parsed function definitions in the values of environment variables.