CVE-2014-6271 Scanner
Detects 'Remote Code Execution (RCE)' vulnerability in GNU Bash affects v. through 4.3.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
15 second
Time Interval
4 week
Scan only one
Url
Toolbox
-
GNU Bash, also known as Bash, is a command-line shell used on UNIX and Linux operating systems. It is an essential tool for system administrators and developers to execute scripts and run commands in the terminal. Bash allows users to access files, manage directories, and interact with system services. As an open-source software, Bash has undergone multiple revisions and updates to improve its functionality and security.
The CVE-2014-6271 vulnerability is a critical security flaw in Bash. This vulnerability allows remote attackers to execute arbitrary code by injecting malicious code through specially crafted environment variables. It was discovered in September 2014 and affected all versions of Bash from 1.14 to 4.3. Attackers could exploit this vulnerability to gain unauthorized access to sensitive information, take control of affected systems, and launch further attacks.
The exploitation of this vulnerability can lead to numerous consequences such as data breaches, stolen credentials, and the spread of malware. Attackers can use Bash to bypass security measures or gain root access to the system, providing a platform to carry out further attacks or damage. Sensitive data like passwords, credit card numbers, bank account information, and personally identifiable information (PII) are all at risk.
At s4e.io, we take security vulnerabilities seriously. With our pro features, you can easily and quickly learn about vulnerabilities in your digital assets and protect them from potential attacks. We provide detailed insights and recommendations on how to secure your systems, network, and applications from known and unknown cyber threats. Stay safe and secure with s4e.io.
REFERENCES
- exploit-db.com: 37816
- http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
- lists.opensuse.org: SUSE-SU-2014:1223
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
- http://www-01.ibm.com/support/docview.wss?uid=swg21685749
- marc.info: HPSBMU03165
- marc.info: SSRT101816
- exploit-db.com: 39918
- marc.info: HPSBHF03119
- rhn.redhat.com: RHSA-2014:1295
- lists.opensuse.org: openSUSE-SU-2014:1226
- https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
- https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
- marc.info: HPSBST03131
- marc.info: SSRT101819
- securityfocus.com: 20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities
- marc.info: HPSBMU03245
- http://www-01.ibm.com/support/docview.wss?uid=swg21686084
- http://www-01.ibm.com/support/docview.wss?uid=swg21686479
- marc.info: HPSBST03196
- secunia.com: 61188
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- jvn.jp: JVN#55667175
- exploit-db.com: 40619
- lists.opensuse.org: openSUSE-SU-2014:1254
- secunia.com: 60433
- exploit-db.com: 38849
- marc.info: HPSBMU03143
- marc.info: HPSBMU03182
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
- lists.opensuse.org: SUSE-SU-2014:1260
- marc.info: HPSBST03155
- http://www-01.ibm.com/support/docview.wss?uid=swg21685541
- secunia.com: 61715
- http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
- secunia.com: 61816
- lists.opensuse.org: openSUSE-SU-2014:1310
- secunia.com: 61442
- marc.info: HPSBMU03246
- marc.info: HPSBST03195
- secunia.com: 61283
- marc.info: SSRT101711
- ubuntu.com: USN-2362-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10085
- lists.opensuse.org: openSUSE-SU-2014:1308
- secunia.com: 61654
- secunia.com: 61542
- http://www.novell.com/support/kb/doc.php?id=7015701
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
- secunia.com: 62312
- secunia.com: 59272
- marc.info: HPSBST03122
- https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
- marc.info: HPSBMU03217
- http://www-01.ibm.com/support/docview.wss?uid=swg21685604
- marc.info: SSRT101868
- secunia.com: 61703
- http://support.apple.com/kb/HT6495
- kb.cert.org: VU#252743
- secunia.com: 61065
- lists.opensuse.org: SUSE-SU-2014:1213
- marc.info: HPSBST03129
- marc.info: HPSBMU03144
- http://www-01.ibm.com/support/docview.wss?uid=swg21686445
- http://www-01.ibm.com/support/docview.wss?uid=swg21686131
- securityfocus.com: 70103
- jvndb.jvn.jp: JVNDB-2014-000126
- marc.info: SSRT101827
- us-cert.gov: TA14-268A
- lists.opensuse.org: SUSE-SU-2014:1212
- secunia.com: 61641
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
- https://access.redhat.com/node/1200223
- http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html
- lists.opensuse.org: SUSE-SU-2014:1287
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
- archives.neohapsis.com: APPLE-SA-2014-10-16-1
- http://www-01.ibm.com/support/docview.wss?uid=swg21685914
- seclists.org: 20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities
- mandriva.com: MDVSA-2015:164
- rhn.redhat.com: RHSA-2014:1293
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
- lists.opensuse.org: openSUSE-SU-2014:1238
- marc.info: HPSBMU03220
- secunia.com: 60325
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- secunia.com: 60024
- http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
- exploit-db.com: 34879
- https://access.redhat.com/articles/1200223
- secunia.com: 62343
- secunia.com: 61565
- https://www.suse.com/support/shellshock/
- marc.info: HPSBST03157
- secunia.com: 61313
- marc.info: SSRT101742
- secunia.com: 61873
- secunia.com: 61485
- secunia.com: 60947
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
- https://support.apple.com/kb/HT6535
- marc.info: HPSBST03154
- marc.info: HPSBST03265
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
- marc.info: HPSBGN03142
- secunia.com: 61312
- secunia.com: 60193
- http://www.vmware.com/security/advisories/VMSA-2014-0010.html
- http://linux.oracle.com/errata/ELSA-2014-1294.html
- secunia.com: 60063
- http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html
- secunia.com: 60034
- marc.info: HPSBMU03133
- http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
- secunia.com: 59907
- secunia.com: 58200
- marc.info: HPSBST03181
- secunia.com: 61643
- http://www.novell.com/support/kb/doc.php?id=7015721
- http://www-01.ibm.com/support/docview.wss?uid=swg21687079
- secunia.com: 61503
- http://www-01.ibm.com/support/docview.wss?uid=swg21686246
- rhn.redhat.com: RHSA-2014:1354
- exploit-db.com: 40938
- marc.info: HPSBGN03117
- http://support.novell.com/security/cve/CVE-2014-6271.html
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
- secunia.com: 61547
- marc.info: HPSBHF03145
- http://www.qnap.com/i/en/support/con_show.php?cid=61
- marc.info: HPSBST03148
- secunia.com: 61552
- secunia.com: 61780
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
- https://support.citrix.com/article/CTX200223
- debian.org: DSA-3032
- http://www-01.ibm.com/support/docview.wss?uid=swg21686447
- secunia.com: 62228
- marc.info: HPSBGN03138
- secunia.com: 61855
- marc.info: HPSBHF03124
- secunia.com: 60044
- secunia.com: 61291
- rhn.redhat.com: RHSA-2014:1294
- marc.info: HPSBHF03125
- secunia.com: 59737
- secunia.com: 61287
- marc.info: HPSBHF03146
- marc.info: HPSBGN03233
- https://bugzilla.redhat.com/show_bug.cgi?id=1141597
- marc.info: SSRT101739
- secunia.com: 61711
- marc.info: HPSBOV03228
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
- marc.info: HPSBGN03141
- http://advisories.mageia.org/MGASA-2014-0388.html
- secunia.com: 61128
- https://support.citrix.com/article/CTX200217
- secunia.com: 61471
- secunia.com: 60055
- tools.cisco.com: 20140926 GNU Bash Environmental Variable Command Injection Vulnerability
- secunia.com: 61550
- secunia.com: 61633
- http://linux.oracle.com/errata/ELSA-2014-1293.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21686494
- https://kb.bluecoat.com/index?page=content&id=SA82
- secunia.com: 61328
- http://www-01.ibm.com/support/docview.wss?uid=swg21685733
- exploit-db.com: 42938
- secunia.com: 61129
- secunia.com: 61700
- secunia.com: 61603
- secunia.com: 61857
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
- http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006