Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:C46B0B3FC4C7E34D197F6DC7E602B255
HistorySep 29, 2014 - 12:00 a.m.

CVE-2014-7186 and CVE-2014-7187 - Bash Out of Bounds | Cloud Foundry

2014-09-2900:00:00
Cloud Foundry
www.cloudfoundry.org
35

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

CVE-2014-7186 and CVE-2014-7187 – Bash Out of Bounds

Moderate

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 10.04 LTS and 14.04 LTS that include bash through 4.3 bash43-026

Description

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the ‘word_lineno’ issue.

The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the ‘redir_stack’ issue.

The Cloud Foundry project is unaware of vulnerable versions of bash potentially allowing a denial of service remotely. No exploits have been identified or confirmed yet.

Affected Products and Versions

_Severity is moderate unless otherwise noted.
_

  • All versions of Cloud Foundry BOSH stemcells prior to 2719.2 and prior have bash executables vulnerable to CVE-2014-7186 and CVE-2014-7187.
  • All versions of Cloud Foundry runtime v187 and prior have bash executables vulnerable to CVE-2014-7186 and CVE-2014-7187.

Mitigation

Users of affected versions should apply the following mitigation:

  • The Cloud Foundry project recommends that Cloud Foundry Runtime Deployments running Release v187 or earlier upgrade to v188 or later and BOSH stemcells 2719.3 or later when they are available, which are planned to contain the patched version of bash that resolves CVE-2014-7186 and CVE-2014-7187.

Credit

Florian Weimer and Todd Sabin

References

History

2014-Sep-29: Initial vulnerability report published.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%