CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
100.0%
GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution.
UPDATE: New CVE-IDs added for incomplete patches. Additional resources added and vendor patch information updated.CWE-78**: OS Command Injection**
Bash supports exporting of shell functions to other instances of bash using an environment variable. This environment variable is named by the function name and starts with a “() {” as the variable value in the function definition. When Bash reaches the end of the function definition, rather than ending execution it continues to process shell commands written after the end of the function. This vulnerability is especially critical because Bash is widespread on many types of devices (UNIX-like operating systems including Linux and Mac OS X), and because many network services utilize Bash, causing the vulnerability to be network exploitable. Any service or program that sets environment variables controlled by an attacker and calls Bash may be vulnerable.
Red Hat has developed the following test:
$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
The website shellshocker.net from the health IT team at Medical Informatics Engineering has developed several tests for websites and hosts and includes update information.
Apply an Update
The first several set of patches (for CVE-2014-6271) do not completely resolve the vulnerability. CVE-2014-7169, CVE-2014-6277, CVE-2014-7186, and CVE 2014-7187 identify the remaining aspects of this vulnerability. Red Hat has provided a support article with updated information and workarounds.
252743
Filter by status: All Affected Not Affected Unknown
Filter by content: __Additional information available
__Sort by: Status Alphabetical
Expand all
Javascript is disabled. Clickhere to view vendors.
Notified: September 25, 2014 Updated: October 01, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 29, 2014
Affected
We have not received a statement from the vendor.
See the following URL for more information from the vendor.
The Avaya Communications Server (CS) 1000 Rls 6 has been reported to be vulnerable.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Notified: September 25, 2014 Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 26, 2014
Statement Date: September 26, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: September 26, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
https://cygwin.com/ml/cygwin-announce/2014-09/msg00033.html
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Notified: September 25, 2014 Updated: October 07, 2014
Affected
All D-Link Devices and Software have been cleared and are not affected by this
vulnerability. All D-Link Services have been audited for the use of bash shell
implementations. Based on the results of the audit we have applied appropriate
updates, if needed, to close this potential vulnerability. D-Link continues
to monitor CERT incase of further issues are reported about the Bash Shell.
(Edited: 10/06/2014 15:52 PST)
Please contact at: [email protected]
Notified: September 25, 2014 Updated: September 27, 2014
Statement Date: September 25, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Dell KACE systems use Bash.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Notified: September 25, 2014 Updated: October 01, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 26, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: October 02, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 26, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: September 25, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 29, 2014
Affected
We have not received a statement from the vendor.
See the following URL for more information from the vendor.
Notified: September 25, 2014 Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
AIX Toolbox for Linux Applications provides Bash and is vulnerable. IBM HTTP Server (IHS) is based on Apache and may act as an attack vector, depending on configuration.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Notified: September 25, 2014 Updated: September 25, 2014
Statement Date: September 25, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: October 07, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: October 02, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
DASDEC-1EN running software version 2.0-2 reported to be vulnerable: http://seclists.org/fulldisclosure/2014/Sep/107.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Notified: September 25, 2014 Updated: October 07, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: November 10, 2014 Updated: November 11, 2014
Affected
`Information contained below is subject to change due to the evolving nature of
CVE-reported information & available fixes.
“ShellShock” CVE-2014-6271 & CVE-2014-7169 are now resolved in software patches
made available via NIKSUN SupportNet. NIKSUN has now produced software updates
for all supported product lines. We continue to observe activity on the NSON
(NIKSUN Security Observation Network) to produce current threat detections –
more signatures may be released as we continuously observe behavior globally.
Current signatures should be downloaded & installed, available via SupportNet,
to get the most out of your NIKSUN security products.
The BASH component defect affecting the community-at-large is serious, but
unlike the Heartbleed defect, which generically affected many publically
available products in exactly the same way, Shellshock requires a specific set
of conditions to exist for exploitation.
NIKSUN is both a contributor to the open source community as well as a consumer
and is leveraging those relationships to bring this issue to a satisfactory
close.
“ShellShock” CVE-2014-6271 & CVE-2014-7169 are now resolved in software patches
made available via NIKSUN SupportNet. NIKSUN has now produced software updates
for all supported product lines, with additional work in progress on breaking
CVEs related to ShellShock exposed in the last few days – software currently
in a quality assurance cycle will become available this week for remaining CVEs
associated with ShellShock now that the global community has agreed on a
sustainable, supportable fix. We continue to observe activity on the NSON
(NIKSUN Security Observation Network) to produce current threat detections with
more signatures released as we continuously observe behavior globally. Current
signatures should be downloaded & installed, available via SupportNet, to get
the most out of your NIKSUN security products.
NIKSUN is committed to providing a rapid resolution to this issue while
ensuring quality, stability & completeness of a fix.
The list below is not a fully comprehensive version list
NIKOS Appliance 4.3.2.0
NIKOS Appliance 4.3.1.2
NIKOS Appliance 4.4.1.1
NIKOS Appliance 4.4.1.2
NIKOS Appliance 4.5.0.0_9
NIKOS Appliance 4.5.0.1
NetOmni 4.3.1.2
NetOmni 4.3.2.0
NetOmni 4.4.1.1
NetOmni 4.4.1.2
NetOmni 4.5.0.0
NetOmni 4.5.0.1
NetOmni 4.5.1.0`
We are not aware of further vendor information regarding this vulnerability.
Updated: September 29, 2014
Affected
We have not received a statement from the vendor.
See the following URL for more information from the vendor
Notified: September 25, 2014 Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 29, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Solaris includes Bash and Oracle Linux is based on Red Hat Linux.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Notified: September 25, 2014 Updated: September 29, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
See PAN-SA-2012-000{2,3,4,5}. Please use CVE.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Updated: April 14, 2015
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 25, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 29, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 25, 2014
Statement Date: September 25, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: September 27, 2014
Affected
As far as we are aware, none of Sophos’s Linux or UNIX products use Bash in a way that would allow this vulnerability to be exploited with data supplied by an attacker from outside.
We are not aware of further vendor information regarding this vulnerability.
Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 27, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: October 01, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 26, 2014
Statement Date: September 25, 2014
Not Affected
Currently we have already patched CVE-2014-6271 and CVE-2014-7169 in the FreeBSD ports tree, making it no longer vulnerable to these two issues. We will patch the new issues once the fix is validated.
The FreeBSD base system do not use bash at all and is therefore not affected.
We are not aware of further vendor information regarding this vulnerability.
FreeBSD has disabled function importing by default in the Bash port.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Notified: September 25, 2014 Updated: October 01, 2014
Not Affected
GTA firewalls running any version of GB-OS are not vulnerable to the “shellshock” exploit.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: October 10, 2014
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 26, 2014
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: October 27, 2014 Updated: October 27, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: November 19, 2014 Updated: November 19, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 25, 2014 Updated: September 25, 2014
Unknown
We have not received a statement from the vendor.
View all 93 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 9.5 | E:H/RL:W/RC:C |
Environmental | 9.6 | CDP:LM/TD:H/CR:ND/IR:ND/AR:ND |
This document was written by Chris King.
CVE IDs: | CVE-2014-6271, CVE-2014-7169, CVE-2014-6277, CVE-2014-7186, CVE-2014-7187 |
---|---|
Date Public: | 2014-09-24 Date First Published: |
lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
seclists.org/oss-sec/2014/q3/650
seclists.org/oss-sec/2014/q3/685
seclists.org/oss-sec/2014/q3/688
access.redhat.com/articles/1200223
gist.github.com/anonymous/929d622f3b36b00c0be1
securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
shellshocker.net/#
www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
100.0%