CVE-2014-6271

Severity CVSS v4.0:
Pending analysis
Type:
CWE-78 OS Command Injections
Publication date:
24/09/2014
Last modified:
12/04/2025

Description

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:* 4.3 (including)
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* 4.9.0 (including) 4.9.12 (excluding)
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* 4.10.0 (including) 4.10.9 (excluding)
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* 4.11.0 (including) 4.11.11 (excluding)
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* 4.12.0 (including) 4.12.9 (excluding)
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* 4.13.0 (including) 4.13.9 (excluding)
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* 4.14.0 (including) 4.14.4f (excluding)
cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:* 4.1.1 (excluding)
cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.1.1:build_0927:*:*:*:*:*:*
cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*


References to Advisories, Solutions, and Tools