Published on 24/09/14 - Updated on 09/10/18
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
CWE-78 (OS Command Injections)
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
|CERTFR-2014-AVI-403, CERTFR-2014-AVI-404, CERTFR-2014-AVI-405, CERTFR-2014-AVI-415, CERTFR-2014-AVI-436, CERTFR-2014-AVI-444, CERTFR-2014-AVI-480, CERTFR-2015-AVI-146|
|RHSA-2014:1293, RHSA-2014:1294, RHSA-2014:1306, RHSA-2014:1311|
|2014/VULN206, 2014/VULN208, 2014/VULN209, 2014/VULN239|
|SUSE-SU-2014:1212, SUSE-SU-2014:1213, SUSE-SU-2014:1214, SUSE-SU-2014:1247, SUSE-SU-2014:1259, SUSE-SU-2014:1260|
|EDB-34765, EDB-34766, EDB-34777, EDB-34839, EDB-34860, EDB-34862, EDB-34879, EDB-34895, EDB-34896, EDB-34900, EDB-35115, EDB-35146, EDB-36503, EDB-36504, EDB-36609, EDB-37816, EDB-38849, EDB-39918, EDB-40619, EDB-40938, EDB-42938|