CVE-2014-6278

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
debianCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
gnubash
1.14.0
gnubash
1.14.1
gnubash
1.14.2
gnubash
1.14.3
gnubash
1.14.4
gnubash
1.14.5
gnubash
1.14.6
gnubash
1.14.7
gnubash
2.0
gnubash
2.01
gnubash
2.01.1
gnubash
2.02
gnubash
2.02.1
gnubash
2.03
gnubash
2.04
gnubash
2.05
gnubash
2.05:a
gnubash
2.05:b
gnubash
3.0
gnubash
3.0.16
gnubash
3.1
gnubash
3.2
gnubash
3.2.48
gnubash
4.0
gnubash
4.0:rc1
gnubash
4.1
gnubash
4.2
gnubash
4.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
bash
bullseye
5.1-2+deb11u1
fixed
bookworm
5.2.15-2
fixed
sid
5.2.32-1
fixed
trixie
5.2.32-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
bash
trusty
Fixed 4.3-7ubuntu1.5
released
precise
Fixed 4.2-2ubuntu2.6
released
lucid
Fixed 4.1-2ubuntu3.5
released
References