Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2014-7187
Severity
10.0CRITICAL
EPSS
89.9%
top 0.43%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 28
Latest updateMay 14
Description
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
CVSS vector
AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0
🔴Vulnerability Details
5VulnCheck▶
GNU Bourne-Again Shell (Bash) Improper Restriction of Operations within the Bounds of a Memory Buffer↗2014
💥Exploits & PoCs
2📋Vendor Advisories
6Debian▶
CVE-2014-7187: bash - Off-by-one error in the read_token_word function in parse.y in GNU Bash through ...↗2014