[CVE-2014-6271] GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability

SecurityDesk
2022.01.28 00:00 조회 7

CISA KEV 정보

취약점명GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability
설명GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code.
조치사항Apply updates per vendor instructions.
랜섬웨어 캠페인 악용Unknown
CWECWE-78
등록일 (KEV)2022-01-28
조치 기한2022-07-28
추가 참고https://nvd.nist.gov/vuln/detail/CVE-2014-6271

NVD 상세 정보

CVSS v3.1: 9.8 CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0: 10.0 AV:N/AC:L/Au:N/C:C/I:C/A:C

설명: GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

CWE: CWE-78 | CWE-78

참조

This product uses the NVD API but is not endorsed or certified by the NVD.



바로 가기

IT 도구 서랍

→ Unix: 2025-01-15T09:30:00
→ 날짜: 1736934600

→ ASCII: ABC
→ 문자: 65 66 67

ASCII 코드표 — 클릭하면 입력란에 추가

DecHex약어설명
DecHex문자
DecHex문자

→ 유니코드: 홍길동
→ 문자: \ud64d\uae38\ub3d9