CVE-2014-6277
27.09.2014, 22:55
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
| Vendor | Product | Version |
|---|---|---|
| gnu | bash | 1.14.0 |
| gnu | bash | 1.14.1 |
| gnu | bash | 1.14.2 |
| gnu | bash | 1.14.3 |
| gnu | bash | 1.14.4 |
| gnu | bash | 1.14.5 |
| gnu | bash | 1.14.6 |
| gnu | bash | 1.14.7 |
| gnu | bash | 2.0 |
| gnu | bash | 2.01 |
| gnu | bash | 2.01.1 |
| gnu | bash | 2.02 |
| gnu | bash | 2.02.1 |
| gnu | bash | 2.03 |
| gnu | bash | 2.04 |
| gnu | bash | 2.05 |
| gnu | bash | 2.05:a |
| gnu | bash | 2.05:b |
| gnu | bash | 3.0 |
| gnu | bash | 3.0.16 |
| gnu | bash | 3.1 |
| gnu | bash | 3.2 |
| gnu | bash | 3.2.48 |
| gnu | bash | 4.0 |
| gnu | bash | 4.0:rc1 |
| gnu | bash | 4.1 |
| gnu | bash | 4.2 |
| gnu | bash | 4.3 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
References