⚠ Actively exploited
Added to CISA KEV on 2022-01-28. Federal agencies required to patch by 2022-07-28. Required action: Apply updates per vendor instructions..
CVE-2014-6271
Severity
9.8CRITICAL
EPSS
94.2%
top 0.08%
CISA KEV
KEV
Added 2022-01-28
Due 2022-07-28
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedSep 24
KEV addedJan 28
Latest updateMay 13
KEV dueJul 28
CISA Required Action: Apply updates per vendor instructions.
Description
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "Sh…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages62 packages
Also affects: Debian Linux 7.0, Ubuntu Linux 10.04, 12.04, 14.04, Enterprise Linux 4.0, 5.0, 6.0, 7.0, 5.9, 6.4, 6.5, 7.3, 7.4, 7.5, 7.6, 7.7, 5.0_ppc, 5.9_ppc, 6.0_ppc64, 6.4_ppc64, 7.0_ppc64, 6.5_ppc64, 7.3_ppc64, 7.4_ppc64, 7.5_ppc64, 7.6_ppc64, 7.7_ppc64, 5.6, 6.2
Patches
🔴Vulnerability Details
4💥Exploits & PoCs
23Exploit-DB▶
TrendMicro InterScan Web Security Virtual Appliance - 'Shellshock' Remote Command Injection↗2016-10-21
Exploit-DB
▶
🔍Detection Rules
26📋Vendor Advisories
8Red Hat
▶
🕵️Threat Intelligence
9Unit42
▶
📄Research Papers
1💬Community
3Bugzilla▶
CVE-2014-7169 bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)↗2014-09-25
Bugzilla▶
CVE-2014-7169 bash: Code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) [fedora-all]↗2014-09-25
Bugzilla▶
CVE-2014-6271 bash: specially-crafted environment variables can be used to inject shell commands↗2014-09-15