First published: Sat Sep 27 2014(Updated: )
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Bash | =1.14.0 | |
GNU Bash | =1.14.1 | |
GNU Bash | =1.14.2 | |
GNU Bash | =1.14.3 | |
GNU Bash | =1.14.4 | |
GNU Bash | =1.14.5 | |
GNU Bash | =1.14.6 | |
GNU Bash | =1.14.7 | |
GNU Bash | =2.0 | |
GNU Bash | =2.01 | |
GNU Bash | =2.01.1 | |
GNU Bash | =2.02 | |
GNU Bash | =2.02.1 | |
GNU Bash | =2.03 | |
GNU Bash | =2.04 | |
GNU Bash | =2.05 | |
GNU Bash | =2.05-a | |
GNU Bash | =2.05-b | |
GNU Bash | =3.0 | |
GNU Bash | =3.0.16 | |
GNU Bash | =3.1 | |
GNU Bash | =3.2 | |
GNU Bash | =3.2.48 | |
GNU Bash | =4.0 | |
GNU Bash | =4.0-rc1 | |
GNU Bash | =4.1 | |
GNU Bash | =4.2 | |
GNU Bash | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.