CVE-2014-6277 : Détail

CVE-2014-6277

OS Command Injection
A03-Injection
85.13%V4
Network
2014-09-27
20h00 +00:00
2018-08-08
07h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 35081

Date de publication : 2014-10-26 23h00 +00:00
Auteur : Michal Zalewski
EDB Vérifié : Yes

Exploit Database EDB-ID : 36933

Date de publication : 2014-09-28 22h00 +00:00
Auteur : fdiskyou
EDB Vérifié : Yes

Exploit Database EDB-ID : 34860

Date de publication : 2014-10-01 22h00 +00:00
Auteur : @0x00string
EDB Vérifié : No

Products Mentioned

Configuraton 0

Gnu>>Bash >> Version 1.14.0

Gnu>>Bash >> Version 1.14.1

Gnu>>Bash >> Version 1.14.2

Gnu>>Bash >> Version 1.14.3

Gnu>>Bash >> Version 1.14.4

Gnu>>Bash >> Version 1.14.5

Gnu>>Bash >> Version 1.14.6

Gnu>>Bash >> Version 1.14.7

Gnu>>Bash >> Version 2.0

Gnu>>Bash >> Version 2.01

Gnu>>Bash >> Version 2.01.1

Gnu>>Bash >> Version 2.02

Gnu>>Bash >> Version 2.02.1

Gnu>>Bash >> Version 2.03

Gnu>>Bash >> Version 2.04

Gnu>>Bash >> Version 2.05

Gnu>>Bash >> Version 2.05

Gnu>>Bash >> Version 2.05

Gnu>>Bash >> Version 3.0

Gnu>>Bash >> Version 3.0.16

Gnu>>Bash >> Version 3.1

Gnu>>Bash >> Version 3.2

Gnu>>Bash >> Version 3.2.48

Gnu>>Bash >> Version 4.0

Gnu>>Bash >> Version 4.0

Gnu>>Bash >> Version 4.1

Gnu>>Bash >> Version 4.2

Gnu>>Bash >> Version 4.3

Références

http://marc.info/?l=bugtraq&m=141577137423233&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142721162228379&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
Tags : vendor-advisory, x_refsource_HP
http://jvn.jp/en/jp/JVN55667175/index.html
Tags : third-party-advisory, x_refsource_JVN
http://secunia.com/advisories/60433
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383026420882&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141585637922673&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141576728022234&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61816
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61442
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142358078406056&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61283
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61654
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-2380-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/62312
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141879528318582&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61703
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61065
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383196021590&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141383081521087&w=2
Tags : vendor-advisory, x_refsource_HP
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Tags : third-party-advisory, x_refsource_JVNDB
http://marc.info/?l=bugtraq&m=141879528318582&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61641
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Tags : vendor-advisory, x_refsource_MANDRIVA
https://support.apple.com/HT205267
Tags : x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721162228379&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/60325
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60024
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/62343
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61565
Tags : third-party-advisory, x_refsource_SECUNIA
http://support.apple.com/HT204244
Tags : x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141450491804793&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61313
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142289270617409&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61485
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141577297623641&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141383244821813&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61312
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60193
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60063
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60034
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/59907
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/58200
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141577241923505&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61643
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61503
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142289270617409&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141383465822787&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61552
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61780
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141330468527613&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/60044
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61291
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141345648114150&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61287
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383353622268&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141383304022067&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61128
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61471
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60055
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/59961
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61550
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61633
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61328
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61129
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61603
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61857
Tags : third-party-advisory, x_refsource_SECUNIA