CVE-2014-7187

EUVD-2014-7064
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
gnubash
1.14.0
gnubash
1.14.1
gnubash
1.14.2
gnubash
1.14.3
gnubash
1.14.4
gnubash
1.14.5
gnubash
1.14.6
gnubash
1.14.7
gnubash
2.0
gnubash
2.01
gnubash
2.01.1
gnubash
2.02
gnubash
2.02.1
gnubash
2.03
gnubash
2.04
gnubash
2.05
gnubash
2.05:a
gnubash
2.05:b
gnubash
3.0
gnubash
3.0.16
gnubash
3.1
gnubash
3.2
gnubash
3.2.48
gnubash
4.0
gnubash
4.0:rc1
gnubash
4.1
gnubash
4.2
gnubash
4.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
bash
bookworm
5.2.15-2
fixed
bullseye
5.1-2+deb11u1
fixed
sid
5.2.32-1
fixed
trixie
5.2.32-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
bash
lucid
Fixed 4.1-2ubuntu3.4
released
precise
Fixed 4.2-2ubuntu2.5
released
trusty
Fixed 4.3-7ubuntu1.4
released
References