CVE-2014-6271
CVE Published | 2014-09-24 |
---|---|
Related CWE(s) | CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
Related Vendor(s) | citrix, novell, redhat, oracle, suse, vmware, qnap, canonical, checkpoint, ibm, f5, apple, arista, mageia, opensuse, debian, gnu |
Related Product(s) | big-ip_policy_enforcement_manager, enterprise_manager, big-ip_application_security_manager, arx_firmware, qradar_security_information_and_event_manager, gluster_storage_server_for_on-premise, security_access_manager_for_web_8.0_firmware, big-ip_edge_gateway, smartcloud_provisioning, big-ip_link_controller, enterprise_linux_for_scientific_computing, opensuse, big-ip_webaccelerator, storwize_v3500_firmware, enterprise_linux_server_from_rhui, enterprise_linux, mac_os_x, traffix_signaling_delivery_controller, virtualization, qradar_risk_manager, linux, enterprise_linux_for_power_big_endian_eus, netscaler_sdx_firmware, flex_system_v7000_firmware, big-iq_cloud, linux_enterprise_server, storwize_v7000_firmware, linux_enterprise_software_development_kit, big-ip_access_policy_manager, enterprise_linux_desktop, bash, big-iq_security, san_volume_controller_firmware, vcenter_server_appliance, esx, smartcloud_entry_appliance, storwize_v5000_firmware, enterprise_linux_for_power_big_endian, qradar_vulnerability_manager, enterprise_linux_workstation, big-ip_global_traffic_manager, enterprise_linux_eus, stn6500_firmware, open_enterprise_server, big-ip_advanced_firewall_manager, debian_linux, security_access_manager_for_mobile_8.0_firmware, infosphere_guardium_database_activity_monitoring, studio_onsite, ubuntu_linux, stn7800_firmware, workload_deployer, qts, big-ip_wan_optimization_manager, pureapplication_system, big-iq_device, enterprise_linux_server_aus, enterprise_linux_for_ibm_z_systems, software_defined_network_for_virtual_environments, big-ip_application_acceleration_manager, big-ip_local_traffic_manager, big-ip_analytics, stn6800_firmware, zenworks_configuration_management, enterprise_linux_server, storwize_v3700_firmware, big-ip_protocol_security_module, security_gateway, security_access_manager_for_web_7.0_firmware, linux_enterprise_desktop, starter_kit_for_cloud, eos, mageia, enterprise_linux_server_tus |
Exploitation Reported (CISA KEV) | 2022-01-28 |
CVSS 3 Base Score | 9.8 (CRITICAL) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | NETWORK |
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph