CVE-2014-7186
28.09.2014, 19:55
The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | bash | 1.14.0 |
gnu | bash | 1.14.1 |
gnu | bash | 1.14.2 |
gnu | bash | 1.14.3 |
gnu | bash | 1.14.4 |
gnu | bash | 1.14.5 |
gnu | bash | 1.14.6 |
gnu | bash | 1.14.7 |
gnu | bash | 2.0 |
gnu | bash | 2.01 |
gnu | bash | 2.01.1 |
gnu | bash | 2.02 |
gnu | bash | 2.02.1 |
gnu | bash | 2.03 |
gnu | bash | 2.04 |
gnu | bash | 2.05 |
gnu | bash | 2.05:a |
gnu | bash | 2.05:b |
gnu | bash | 3.0 |
gnu | bash | 3.0.16 |
gnu | bash | 3.1 |
gnu | bash | 3.2 |
gnu | bash | 3.2.48 |
gnu | bash | 4.0 |
gnu | bash | 4.0:rc1 |
gnu | bash | 4.1 |
gnu | bash | 4.2 |
gnu | bash | 4.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References