ALT-PU-2014-2209-1
Closed vulnerabilities
BDU:2014-00319
Уязвимость интерпретатора командной строки GNU Bash, позволяющая злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-09794
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09818
Уязвимости операционной системы Альт Линукс СПТ, позволяющие удаленному злоумышленнику нарушить работоспособность устройства
Modified: 2024-11-21
CVE-2014-6278
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
- JVN#55667175
- JVN#55667175
- JVNDB-2014-000126
- JVNDB-2014-000126
- http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
- http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
- http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
- http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
- http://linux.oracle.com/errata/ELSA-2014-3093
- http://linux.oracle.com/errata/ELSA-2014-3093
- http://linux.oracle.com/errata/ELSA-2014-3094
- http://linux.oracle.com/errata/ELSA-2014-3094
- SUSE-SU-2014:1287
- SUSE-SU-2014:1287
- openSUSE-SU-2014:1310
- openSUSE-SU-2014:1310
- HPSBGN03138
- HPSBGN03138
- HPSBHF03125
- HPSBHF03125
- HPSBMU03143
- HPSBMU03143
- HPSBMU03144
- HPSBMU03144
- HPSBST03129
- HPSBST03129
- HPSBGN03142
- HPSBGN03142
- HPSBGN03141
- HPSBGN03141
- HPSBHF03146
- HPSBHF03146
- HPSBHF03145
- HPSBHF03145
- HPSBST03157
- HPSBST03157
- HPSBST03155
- HPSBST03155
- HPSBMU03165
- HPSBMU03165
- HPSBST03181
- HPSBST03181
- HPSBST03154
- HPSBST03154
- HPSBMU03182
- HPSBMU03182
- HPSBMU03217
- HPSBMU03217
- SSRT101827
- SSRT101827
- HPSBGN03233
- HPSBGN03233
- SSRT101739
- SSRT101739
- SSRT101868
- SSRT101868
- HPSBMU03245
- HPSBMU03245
- SSRT101742
- SSRT101742
- HPSBMU03246
- HPSBMU03246
- HPSBMU03220
- HPSBMU03220
- SSRT101819
- SSRT101819
- http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
- http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
- http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html
- http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html
- 58200
- 58200
- 59907
- 59907
- 59961
- 59961
- 60024
- 60024
- 60034
- 60034
- 60044
- 60044
- 60055
- 60055
- 60063
- 60063
- 60193
- 60193
- 60325
- 60325
- 60433
- 60433
- 61065
- 61065
- 61128
- 61128
- 61129
- 61129
- 61283
- 61283
- 61287
- 61287
- 61291
- 61291
- 61312
- 61312
- 61313
- 61313
- 61328
- 61328
- 61442
- 61442
- 61471
- 61471
- 61485
- 61485
- 61503
- 61503
- 61550
- 61550
- 61552
- 61552
- 61565
- 61565
- 61603
- 61603
- 61633
- 61633
- 61641
- 61641
- 61643
- 61643
- 61654
- 61654
- 61703
- 61703
- 61780
- 61780
- 61816
- 61816
- 61857
- 61857
- 62312
- 62312
- 62343
- 62343
- http://support.novell.com/security/cve/CVE-2014-6278.html
- http://support.novell.com/security/cve/CVE-2014-6278.html
- 20140926 GNU Bash Environment Variable Command Injection Vulnerability
- 20140926 GNU Bash Environment Variable Command Injection Vulnerability
- MDVSA-2015:164
- MDVSA-2015:164
- http://www.novell.com/support/kb/doc.php?id=7015721
- http://www.novell.com/support/kb/doc.php?id=7015721
- http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
- http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
- http://www.qnap.com/i/en/support/con_show.php?cid=61
- http://www.qnap.com/i/en/support/con_show.php?cid=61
- USN-2380-1
- USN-2380-1
- http://www.vmware.com/security/advisories/VMSA-2014-0010.html
- http://www.vmware.com/security/advisories/VMSA-2014-0010.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
- http://www-01.ibm.com/support/docview.wss?uid=swg21685541
- http://www-01.ibm.com/support/docview.wss?uid=swg21685541
- http://www-01.ibm.com/support/docview.wss?uid=swg21685604
- http://www-01.ibm.com/support/docview.wss?uid=swg21685604
- http://www-01.ibm.com/support/docview.wss?uid=swg21685733
- http://www-01.ibm.com/support/docview.wss?uid=swg21685733
- http://www-01.ibm.com/support/docview.wss?uid=swg21685749
- http://www-01.ibm.com/support/docview.wss?uid=swg21685749
- http://www-01.ibm.com/support/docview.wss?uid=swg21685914
- http://www-01.ibm.com/support/docview.wss?uid=swg21685914
- http://www-01.ibm.com/support/docview.wss?uid=swg21686131
- http://www-01.ibm.com/support/docview.wss?uid=swg21686131
- http://www-01.ibm.com/support/docview.wss?uid=swg21686246
- http://www-01.ibm.com/support/docview.wss?uid=swg21686246
- http://www-01.ibm.com/support/docview.wss?uid=swg21686445
- http://www-01.ibm.com/support/docview.wss?uid=swg21686445
- http://www-01.ibm.com/support/docview.wss?uid=swg21686479
- http://www-01.ibm.com/support/docview.wss?uid=swg21686479
- http://www-01.ibm.com/support/docview.wss?uid=swg21686494
- http://www-01.ibm.com/support/docview.wss?uid=swg21686494
- http://www-01.ibm.com/support/docview.wss?uid=swg21687079
- http://www-01.ibm.com/support/docview.wss?uid=swg21687079
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
- https://bugzilla.redhat.com/show_bug.cgi?id=1147414
- https://bugzilla.redhat.com/show_bug.cgi?id=1147414
- https://kb.bluecoat.com/index?page=content&id=SA82
- https://kb.bluecoat.com/index?page=content&id=SA82
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
- https://kc.mcafee.com/corporate/index?page=content&id=SB10085
- https://kc.mcafee.com/corporate/index?page=content&id=SB10085
- https://security-tracker.debian.org/tracker/CVE-2014-6278
- https://security-tracker.debian.org/tracker/CVE-2014-6278
- https://support.citrix.com/article/CTX200217
- https://support.citrix.com/article/CTX200217
- https://support.citrix.com/article/CTX200223
- https://support.citrix.com/article/CTX200223
- https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
- https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
- https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
- https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
- https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006
- https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006
- 39568
- 39568
- 39887
- 39887
- https://www.suse.com/support/shellshock/
- https://www.suse.com/support/shellshock/