Lucene search

K
saintSAINT CorporationSAINT:5C86AB1074A96B306662C51ADE6F4B61
HistorySep 26, 2014 - 12:00 a.m.

Bash environment variable code injection over HTTP

2014-09-2600:00:00
SAINT Corporation
download.saintcorporation.com
76

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.976 High

EPSS

Percentile

100.0%

Added: 09/26/2014
CVE: CVE-2014-6271
BID: 70103
OSVDB: 112004

Background

GNU Bash (Bourne Again SHell) is a command shell commonly used on Linux and Unix systems.

Problem

The Bash shell executes commands injected after function definitions contained in environment variables. This could be used by a remote attacker to cause arbitrary commands to execute if a web server hosts programs which invoke the Bash shell.

Resolution

Apply updated Bash packages from the Linux or Unix vendor.

References

<https://www.us-cert.gov/ncas/alerts/TA14-268A&gt;

Limitations

This exploit requires the path to a web program which invokes the Bash shell. This attack vector may not exist on all systems with affected versions of Bash, and other attack vectors may exist which are not covered by this exploit.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.976 High

EPSS

Percentile

100.0%