Lucene search

K
amazonAmazonALAS-2014-418
HistorySep 24, 2014 - 7:48 a.m.

Critical: bash

2014-09-2407:48:00
alas.aws.amazon.com
32

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.976 High

EPSS

Percentile

100.0%

Issue Overview:

This ALAS is superceded by ALAS-2014-419 (https://alas.aws.amazon.com/ALAS-2014-419.html").

A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.

We’d like to also give credit to our colleagues at Red Hat for their excellent blog post (https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/) summarizing this issue.

This ALAS is superceded by ALAS-2014-419 (https://alas.aws.amazon.com/ALAS-2014-419.html).

Affected Packages:

bash

Issue Correction:
Run yum update bash to update your system.’

New Packages:

i686:  
    bash-doc-4.1.2-15.19.amzn1.i686  
    bash-4.1.2-15.19.amzn1.i686  
    bash-debuginfo-4.1.2-15.19.amzn1.i686  
  
src:  
    bash-4.1.2-15.19.amzn1.src  
  
x86_64:  
    bash-4.1.2-15.19.amzn1.x86_64  
    bash-debuginfo-4.1.2-15.19.amzn1.x86_64  
    bash-doc-4.1.2-15.19.amzn1.x86_64  

Additional References

Red Hat: CVE-2014-6271

Mitre: CVE-2014-6271

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.976 High

EPSS

Percentile

100.0%