CVE-2014-7187

Loading...

General

Score:10.0/10.0
Severity:High
Category:Buffer Error
Exploit:Available

Impact Metrics

Confidentiality:Complete
Integrity:Complete
Availability:Complete

Exploitability Metrics

Access Vector:Network
Access Complexity:Low
Authentication:None

Relative vulnerabilities

CVE-2011-2391, CVE-2013-3951, CVE-2014-1595, CVE-2014-2532, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568, CVE-2014-3618, CVE-2014-4371, CVE-2014-4389, CVE-2014-4419, CVE-2014-4420, CVE-2014-4421, CVE-2014-4426, CVE-2014-4460, CVE-2014-4461, CVE-2014-4481, CVE-2014-4483, CVE-2014-4484, CVE-2014-4485, CVE-2014-4486, CVE-2014-4487, CVE-2014-4488, CVE-2014-4489, CVE-2014-4491, CVE-2014-4492, CVE-2014-4495, CVE-2014-4497, CVE-2014-4498, CVE-2014-4499, CVE-2014-5352, CVE-2014-6271, CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, CVE-2014-8080, CVE-2014-8090, CVE-2014-8146, CVE-2014-8147, CVE-2014-8517, CVE-2014-8611, CVE-2014-8816, CVE-2014-8817, CVE-2014-8819, CVE-2014-8820, CVE-2014-8821, CVE-2014-8822, CVE-2014-8823, CVE-2014-8824, CVE-2014-8825, CVE-2014-8826, CVE-2014-8827, CVE-2014-8828, CVE-2014-8829, CVE-2014-8830, CVE-2014-8831, CVE-2014-8832, CVE-2014-8833, CVE-2014-8834, CVE-2014-8835, CVE-2014-8836, CVE-2014-8837, CVE-2014-8838, CVE-2014-8839, CVE-2014-9297, CVE-2014-9425, CVE-2014-9427, CVE-2014-9652, CVE-2014-9705, CVE-2014-9709, CVE-2015-0231, CVE-2015-0232, CVE-2015-0235, CVE-2015-0273, CVE-2015-0286, CVE-2015-0287, CVE-2015-1351, CVE-2015-1352, CVE-2015-1855, CVE-2015-2301, CVE-2015-2305, CVE-2015-2331, CVE-2015-2348, CVE-2015-2783, CVE-2015-2787, CVE-2015-3329, CVE-2015-3330, CVE-2015-3414, CVE-2015-3415, CVE-2015-3416, CVE-2015-3785, CVE-2015-5522, CVE-2015-5523, CVE-2015-5824, CVE-2015-5830, CVE-2015-5831, CVE-2015-5833, CVE-2015-5836, CVE-2015-5839, CVE-2015-5840, CVE-2015-5841, CVE-2015-5842, CVE-2015-5847, CVE-2015-5849, CVE-2015-5851, CVE-2015-5853, CVE-2015-5854, CVE-2015-5855, CVE-2015-5858, CVE-2015-5859, CVE-2015-5860, CVE-2015-5862, CVE-2015-5863, CVE-2015-5864, CVE-2015-5865, CVE-2015-5866, CVE-2015-5867, CVE-2015-5868, CVE-2015-5869, CVE-2015-5870, CVE-2015-5871, CVE-2015-5872, CVE-2015-5873, CVE-2015-5874, CVE-2015-5875, CVE-2015-5876, CVE-2015-5877, CVE-2015-5878, CVE-2015-5879, CVE-2015-5881, CVE-2015-5882, CVE-2015-5883, CVE-2015-5884, CVE-2015-5885, CVE-2015-5887, CVE-2015-5888, CVE-2015-5889, CVE-2015-5890, CVE-2015-5891, CVE-2015-5893, CVE-2015-5894, CVE-2015-5896, CVE-2015-5897, CVE-2015-5899, CVE-2015-5900, CVE-2015-5901, CVE-2015-5902, CVE-2015-5903, CVE-2015-5912, CVE-2015-5913, CVE-2015-5914, CVE-2015-5915, CVE-2015-5917, CVE-2015-5922

Published on 28/09/14 - Updated on 09/10/18

Description

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.

Category: Buffer Error

CWE-119 (Buffer Errors)
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

Security Notices

US National Vulnerability DatabaseCVE-2014-7187
Amazon Linux ALAS-2014-419
Agence Nationale de la Sécurité des Systèmes d'Information CERTFR-2014-AVI-403, CERTFR-2014-AVI-415, CERTFR-2014-AVI-444, CERTFR-2014-AVI-480, CERTFR-2015-AVI-040, CERTFR-2015-AVI-416
Apple HT204244, HT205267
Debian DSA-3035-1
Debian LTSDLA-63-1
Redhat RHSA-2014:1311
Renater 2014/VULN205, 2014/VULN206, 2014/VULN208, 2014/VULN239, 2015/VULN001
SUSE SUSE-SU-2014:1247, SUSE-SU-2014:1259
Ubuntu USN-2364-1

Exploits

Exploit-DBEDB-34860, EDB-36933

Relative technologies

VendorProduct
gnubash

Share this vulnerability with:

Twitter Facebook LinkedIn Mail