CVE-2014-7187

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
gnubash
1.14.0
gnubash
1.14.1
gnubash
1.14.2
gnubash
1.14.3
gnubash
1.14.4
gnubash
1.14.5
gnubash
1.14.6
gnubash
1.14.7
gnubash
2.0
gnubash
2.01
gnubash
2.01.1
gnubash
2.02
gnubash
2.02.1
gnubash
2.03
gnubash
2.04
gnubash
2.05
gnubash
2.05:a
gnubash
2.05:b
gnubash
3.0
gnubash
3.0.16
gnubash
3.1
gnubash
3.2
gnubash
3.2.48
gnubash
4.0
gnubash
4.0:rc1
gnubash
4.1
gnubash
4.2
gnubash
4.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
bash
bullseye
5.1-2+deb11u1
fixed
bookworm
5.2.15-2
fixed
sid
5.2.32-1
fixed
trixie
5.2.32-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
bash
trusty
Fixed 4.3-7ubuntu1.4
released
precise
Fixed 4.2-2ubuntu2.5
released
lucid
Fixed 4.1-2ubuntu3.4
released
References