ID

VAR-201409-0366


CVE

CVE-2014-6277


TITLE

GNU Bash shell executes commands in exported functions in environment variables

Trust: 0.8

sources: CERT/CC: VU#252743

DESCRIPTION

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169. GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. HP Vertica AMI's and Virtual Machines prior to v7.1.1-0. BACKGROUND HP Vertica AMI's and Virtual Machines prior to v7.1.1-0 include a vulnerable version of the Bash shell. HP has released the following updates to resolve this vulnerability for HP Vertica products. Update to the latest VM image available at: https://my.vertica.com For customers using the AMI version HP Vertica Analytics platform, please install the latest image available at Amazon. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." Copyright 2014 Hewlett-Packard Development Company, L.P. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04487573 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04487573 Version: 1 HPSBST03155 rev.1 - HP StoreFabric H-series switches running Bash Shell, Remote Code Execution NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2014-11-11 Last Updated: 2014-11-11 Potential Security Impact: Remote code execution Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP StoreFabric H-series switches running Bash Shell. References: CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 SSRT101747 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. All HP StoreFabric H-series switches BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP is actively working on a firmware update to resolve the vulnerability in HP StoreFabric H-series switches. This bulletin will be revised when the update is available. MITIGATION INFORMATION HP recommends the following steps to reduce the risk of this vulnerability: - Place the HP StoreFabric H-series switch and other data center critical infrastructure behind a firewall to disallow access from the Internet. - Change all HP StoreFabric switch default account passwords, including the root passwords, from the default factory passwords. - Examine the list of accounts, including ones on the switch and those existing on remote authentication servers such as RADIUS, LDAP, and TACAS+, to ensure only necessary personnel can gain access to HP StoreFabric H-series switches. Delete guest accounts and temporary accounts created for one-time usage needs. - To avoid possible exploit through the embedded web GUI, QuickTools, disable the web server with the following procedure: NOTE: After completing this procedure, the user will not be able to manage the switch using QuickTools. 1. Login to the Command Line Interface (CLI). 2. Execute the "admin start" command to enter into an admin session. 3. Execute the "set setup services" command and change setting for EmbeddedGUIEnabled to "False". HISTORY Version:1 (rev.1) - 11 November 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux) iEYEARECAAYFAlRih1AACgkQ4B86/C0qfVkTcACgxGfOP4MElysfECAvNJSqkgk2 LCAAn0YGgpGgh493pj4rgB8hPH0PETxo =X8Sm -----END PGP SIGNATURE----- . Open the PXE Configuration Utility on the HP Insight Control server deployment window Select Linux Managed from the Boot Menu options Click the Edit button. Clicking the Edit button displays the Edit Shared Menu Option window Uncheck the x86 option in Operating System and Processor Options and click OK. NOTE: This vulnerability can only be exploited if the attacker already has valid administrative login credentials. This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script. Customers who need to upgrade the firmware of their Superdome X or HP Converged System 900 for SAP HANA should contact HP Technical Support to obtain the firmware or plan to schedule an onsite visit with an HP Services field service professional. Patch and maintain Lightweight Directory Access Protocol (LDAP) and web servers. Use virus scanners, intrusion detection/prevention systems (IDS/IPS), and vulnerability scanners regularly. No other firmware stream updates are planned beyond the NX-OS 5.x and 6.x versions listed below for the MDS products. This software versions 6.2(9a) has included the fixes for the vulnerability in HP StoreFabric C-series MDS switches which currently supporting NX-OS 6.X releases. This software version 5.2(8e) has included the fix for the vulnerability in HP C-series MDS switches which currently supporting NX-OS 5.X releases. All MDS and Nexus 5K switches can function in this configuration. Access is available through the console port

Trust: 3.33

sources: NVD: CVE-2014-6277 // CERT/CC: VU#252743 // BID: 70165 // PACKETSTORM: 129095 // PACKETSTORM: 128765 // PACKETSTORM: 129617 // PACKETSTORM: 129073 // PACKETSTORM: 130335 // PACKETSTORM: 130196 // PACKETSTORM: 128762 // PACKETSTORM: 128763 // PACKETSTORM: 128716 // VULMON: CVE-2014-6277 // PACKETSTORM: 128666 // PACKETSTORM: 129067 // PACKETSTORM: 130988 // PACKETSTORM: 128753 // PACKETSTORM: 128764 // PACKETSTORM: 129438

AFFECTED PRODUCTS

vendor:gnumodel:bashscope:eqversion:3.2.48

Trust: 1.3

vendor:gnumodel:bashscope:eqversion:4.0

Trust: 1.3

vendor:gnumodel:bashscope:eqversion:3.2

Trust: 1.3

vendor:gnumodel:bashscope:eqversion:4.2

Trust: 1.3

vendor:gnumodel:bashscope:eqversion:3.0.16

Trust: 1.3

vendor:gnumodel:bashscope:eqversion:4.1

Trust: 1.3

vendor:gnumodel:bashscope:eqversion:3.0

Trust: 1.3

vendor:gnumodel:bashscope:eqversion:1.14.0

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:3.1

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:1.14.6

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:1.14.5

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.04

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:1.14.4

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.01.1

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:1.14.1

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:1.14.2

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:4.3

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:1.14.3

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.02.1

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.02

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:1.14.7

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.03

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.01

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.05

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.0

Trust: 1.0

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:barracudamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:centosmodel: - scope: - version: -

Trust: 0.8

vendor:check pointmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:cygwinmodel: - scope: - version: -

Trust: 0.8

vendor:d linkmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:dell computermodel: - scope: - version: -

Trust: 0.8

vendor:extrememodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:fireeyemodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:gnu bashmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mageiamodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:monroemodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:niksunmodel: - scope: - version: -

Trust: 0.8

vendor:netappmodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:oraclemodel: - scope: - version: -

Trust: 0.8

vendor:palo altomodel: - scope: - version: -

Trust: 0.8

vendor:qnap securitymodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sophosmodel: - scope: - version: -

Trust: 0.8

vendor:trend micromodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:xirrusmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16.2

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9302

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7228

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.0

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.00.0(2)

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7238

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux long life serverscope:eqversion:5.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:mcafeemodel:email gateway hotfixscope:eqversion:6.7.21

Trust: 0.3

vendor:cosmicperlmodel:directory proscope:eqversion:10.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.1.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9301

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.3

vendor:xeroxmodel:phaserscope:eqversion:78000

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:ibmmodel:ds8000scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.4

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16

Trust: 0.3

vendor:gnumodel:bash rc1scope:eqversion:4.0

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7232

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:3.2

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7242

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:xeroxmodel:phaserscope:eqversion:67000

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9393

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:ciscomodel:gss 4492r global site selectorscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9303

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:mcafeemodel:email gateway hotfixscope:eqversion:6.7.22

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7235

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:3.1

Trust: 0.3

vendor:mcafeemodel:email gateway patchscope:eqversion:7.01

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7245

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:5(2)

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux clientscope:eqversion:5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:hpmodel:insight controlscope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.3

sources: CERT/CC: VU#252743 // BID: 70165 // NVD: CVE-2014-6277

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-6277
value: HIGH

Trust: 1.0

VULMON: CVE-2014-6277
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-6277
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

sources: VULMON: CVE-2014-6277 // NVD: CVE-2014-6277

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

sources: NVD: CVE-2014-6277

THREAT TYPE

network

Trust: 0.3

sources: BID: 70165

TYPE

Design Error

Trust: 0.3

sources: BID: 70165

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2014-6277

PATCH

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2014-6277

Trust: 0.1

title:Ubuntu Security Notice: bash vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2380-1

Trust: 0.1

title:VMware Security Advisories: VMware product updates address critical Bash security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=86cb6b3955e100fdc9667a7ca916c772

Trust: 0.1

title:Symantec Security Advisories: SA82 : GNU Bash Shellshock Command Injection Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=2b57ceaadfde2a8b03482273e1fd21ea

Trust: 0.1

title:Apple: OS X Yosemite v10.10.2 and Security Update 2015-001url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=64cbe709a7be49c91d8a8b0f43621640

Trust: 0.1

title:Tenable Security Advisories: [R7] Tenable Appliance Affected by GNU bash 'Shellshock' Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2014-07

Trust: 0.1

title:Citrix Security Bulletins: Citrix XenServer Shellshock Security Updateurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=64ae0aae8269062686789e3a3fa1d2bf

Trust: 0.1

title:Citrix Security Bulletins: Citrix Security Advisory for GNU Bash Shellshock Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=73443a6db89dc66fc6bcb49f85bfd1ab

Trust: 0.1

title:Apple: OS X El Capitan v10.11url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=e88bab658248444f5dffc23fd95859e7

Trust: 0.1

title:patch-bash-shellshockurl:https://github.com/jdauphant/patch-bash-shellshock

Trust: 0.1

title:macosx-bash-92-shellshock-patchedurl:https://github.com/ido/macosx-bash-92-shellshock-patched

Trust: 0.1

title:w-testurl:https://github.com/inspirion87/w-test

Trust: 0.1

title:shellshockFixOSXurl:https://github.com/opragel/shellshockFixOSX

Trust: 0.1

title:shocktrooperurl:https://github.com/EvanK/shocktrooper

Trust: 0.1

title:ShellShockHunterurl:https://github.com/MrCl0wnLab/ShellShockHunter

Trust: 0.1

title:Xpl-SHELLSHOCK-Ch3ckurl:https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck

Trust: 0.1

title:bashcheckurl:https://github.com/hannob/bashcheck

Trust: 0.1

title:shellshocker-pocsurl:https://github.com/mubix/shellshocker-pocs

Trust: 0.1

title:LinuxFlawurl:https://github.com/mudongliang/LinuxFlaw

Trust: 0.1

title:afl-cveurl:https://github.com/mrash/afl-cve

Trust: 0.1

title:Threatposturl:https://threatpost.com/researcher-takes-wraps-off-two-undisclosed-shellshock-vulnerabilities-in-bash/108674/

Trust: 0.1

sources: VULMON: CVE-2014-6277

EXTERNAL IDS

db:NVDid:CVE-2014-6277

Trust: 2.9

db:SECUNIAid:60325

Trust: 1.1

db:SECUNIAid:61065

Trust: 1.1

db:SECUNIAid:61780

Trust: 1.1

db:SECUNIAid:61603

Trust: 1.1

db:SECUNIAid:61287

Trust: 1.1

db:SECUNIAid:61643

Trust: 1.1

db:SECUNIAid:60433

Trust: 1.1

db:SECUNIAid:61565

Trust: 1.1

db:SECUNIAid:61312

Trust: 1.1

db:SECUNIAid:61703

Trust: 1.1

db:SECUNIAid:61503

Trust: 1.1

db:SECUNIAid:60034

Trust: 1.1

db:SECUNIAid:60044

Trust: 1.1

db:SECUNIAid:61328

Trust: 1.1

db:SECUNIAid:59907

Trust: 1.1

db:SECUNIAid:61129

Trust: 1.1

db:SECUNIAid:60024

Trust: 1.1

db:SECUNIAid:59961

Trust: 1.1

db:SECUNIAid:61633

Trust: 1.1

db:SECUNIAid:61128

Trust: 1.1

db:SECUNIAid:61313

Trust: 1.1

db:SECUNIAid:60055

Trust: 1.1

db:SECUNIAid:61291

Trust: 1.1

db:SECUNIAid:62343

Trust: 1.1

db:SECUNIAid:61641

Trust: 1.1

db:SECUNIAid:61857

Trust: 1.1

db:SECUNIAid:61816

Trust: 1.1

db:SECUNIAid:62312

Trust: 1.1

db:SECUNIAid:60193

Trust: 1.1

db:SECUNIAid:60063

Trust: 1.1

db:SECUNIAid:58200

Trust: 1.1

db:SECUNIAid:61654

Trust: 1.1

db:SECUNIAid:61550

Trust: 1.1

db:SECUNIAid:61283

Trust: 1.1

db:SECUNIAid:61485

Trust: 1.1

db:SECUNIAid:61471

Trust: 1.1

db:SECUNIAid:61442

Trust: 1.1

db:SECUNIAid:61552

Trust: 1.1

db:MCAFEEid:SB10085

Trust: 1.1

db:PACKETSTORMid:128567

Trust: 1.1

db:JVNid:JVN55667175

Trust: 1.1

db:JVNDBid:JVNDB-2014-000126

Trust: 1.1

db:JUNIPERid:JSA10648

Trust: 1.1

db:CERT/CCid:VU#252743

Trust: 0.9

db:BIDid:70165

Trust: 0.3

db:EXPLOIT-DBid:35081

Trust: 0.1

db:VULMONid:CVE-2014-6277

Trust: 0.1

db:PACKETSTORMid:128716

Trust: 0.1

db:PACKETSTORMid:128764

Trust: 0.1

db:PACKETSTORMid:128753

Trust: 0.1

db:PACKETSTORMid:130988

Trust: 0.1

db:PACKETSTORMid:129067

Trust: 0.1

db:PACKETSTORMid:128666

Trust: 0.1

db:PACKETSTORMid:129438

Trust: 0.1

db:PACKETSTORMid:128763

Trust: 0.1

db:PACKETSTORMid:129095

Trust: 0.1

db:PACKETSTORMid:128762

Trust: 0.1

db:PACKETSTORMid:130196

Trust: 0.1

db:PACKETSTORMid:130335

Trust: 0.1

db:PACKETSTORMid:129073

Trust: 0.1

db:PACKETSTORMid:129617

Trust: 0.1

db:PACKETSTORMid:128765

Trust: 0.1

sources: CERT/CC: VU#252743 // VULMON: CVE-2014-6277 // BID: 70165 // PACKETSTORM: 128716 // PACKETSTORM: 128764 // PACKETSTORM: 128753 // PACKETSTORM: 130988 // PACKETSTORM: 129067 // PACKETSTORM: 128666 // PACKETSTORM: 129438 // PACKETSTORM: 128763 // PACKETSTORM: 129095 // PACKETSTORM: 128762 // PACKETSTORM: 130196 // PACKETSTORM: 130335 // PACKETSTORM: 129073 // PACKETSTORM: 129617 // PACKETSTORM: 128765 // NVD: CVE-2014-6277

REFERENCES

url:http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html

Trust: 1.9

url:https://kb.bluecoat.com/index?page=content&id=sa82

Trust: 1.9

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash

Trust: 1.9

url:https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html

Trust: 1.9

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10085

Trust: 1.9

url:https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/

Trust: 1.6

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-6277

Trust: 1.5

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 1.4

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-7169

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-6271

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-6278

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-7186

Trust: 1.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-7187

Trust: 1.3

url:https://www.suse.com/support/shellshock/

Trust: 1.1

url:http://support.novell.com/security/cve/cve-2014-6277.html

Trust: 1.1

url:http://secunia.com/advisories/61641

Trust: 1.1

url:http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html

Trust: 1.1

url:http://secunia.com/advisories/61485

Trust: 1.1

url:http://secunia.com/advisories/59907

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2380-1

Trust: 1.1

url:http://secunia.com/advisories/61654

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685749

Trust: 1.1

url:http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html

Trust: 1.1

url:http://secunia.com/advisories/61565

Trust: 1.1

url:http://www.novell.com/support/kb/doc.php?id=7015721

Trust: 1.1

url:http://www.vmware.com/security/advisories/vmsa-2014-0010.html

Trust: 1.1

url:http://secunia.com/advisories/61643

Trust: 1.1

url:http://secunia.com/advisories/61503

Trust: 1.1

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10648

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html

Trust: 1.1

url:http://secunia.com/advisories/61633

Trust: 1.1

url:http://secunia.com/advisories/61552

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685914

Trust: 1.1

url:http://secunia.com/advisories/61703

Trust: 1.1

url:http://secunia.com/advisories/61283

Trust: 1.1

url:http://secunia.com/advisories/61603

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141330468527613&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141345648114150&w=2

Trust: 1.1

url:https://support.citrix.com/article/ctx200217

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879

Trust: 1.1

url:http://secunia.com/advisories/60034

Trust: 1.1

url:http://secunia.com/advisories/61816

Trust: 1.1

url:http://secunia.com/advisories/61128

Trust: 1.1

url:http://secunia.com/advisories/61313

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685733

Trust: 1.1

url:http://secunia.com/advisories/61442

Trust: 1.1

url:http://secunia.com/advisories/61287

Trust: 1.1

url:https://support.citrix.com/article/ctx200223

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279

Trust: 1.1

url:http://secunia.com/advisories/60055

Trust: 1.1

url:http://secunia.com/advisories/61129

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897

Trust: 1.1

url:http://secunia.com/advisories/61780

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686479

Trust: 1.1

url:http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685541

Trust: 1.1

url:http://secunia.com/advisories/61471

Trust: 1.1

url:http://secunia.com/advisories/61328

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915

Trust: 1.1

url:http://secunia.com/advisories/58200

Trust: 1.1

url:http://secunia.com/advisories/61857

Trust: 1.1

url:http://secunia.com/advisories/60193

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685604

Trust: 1.1

url:http://secunia.com/advisories/61065

Trust: 1.1

url:http://secunia.com/advisories/61550

Trust: 1.1

url:http://secunia.com/advisories/60325

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686131

Trust: 1.1

url:http://secunia.com/advisories/61312

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686494

Trust: 1.1

url:http://secunia.com/advisories/60063

Trust: 1.1

url:http://secunia.com/advisories/61291

Trust: 1.1

url:http://secunia.com/advisories/60044

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686246

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686445

Trust: 1.1

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk102673&src=securityalerts

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687079

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361

Trust: 1.1

url:http://secunia.com/advisories/60433

Trust: 1.1

url:http://secunia.com/advisories/60024

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141383353622268&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141383304022067&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141383244821813&w=2

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141450491804793&w=2

Trust: 1.1

url:http://jvn.jp/en/jp/jvn55667175/index.html

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141383081521087&w=2

Trust: 1.1

url:http://www.qnap.com/i/en/support/con_show.php?cid=61

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141383026420882&w=2

Trust: 1.1

url:http://jvndb.jvn.jp/jvndb/jvndb-2014-000126

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141383196021590&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141383465822787&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141577137423233&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141577241923505&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141576728022234&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141577297623641&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141585637922673&w=2

Trust: 1.1

url:http://secunia.com/advisories/62312

Trust: 1.1

url:http://secunia.com/advisories/59961

Trust: 1.1

url:http://secunia.com/advisories/62343

Trust: 1.1

url:http://linux.oracle.com/errata/elsa-2014-3093

Trust: 1.1

url:http://linux.oracle.com/errata/elsa-2014-3094

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html

Trust: 1.1

url:http://support.apple.com/ht204244

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142358026505815&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142358078406056&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142289270617409&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141879528318582&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142118135300698&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142721162228379&w=2

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:164

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html

Trust: 1.1

url:https://support.apple.com/ht205267

Trust: 1.1

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04518183

Trust: 1.1

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04497075

Trust: 1.1

url:http://seclists.org/oss-sec/2014/q3/650

Trust: 0.8

url:https://access.redhat.com/articles/1200223

Trust: 0.8

url:http://seclists.org/oss-sec/2014/q3/688

Trust: 0.8

url:http://seclists.org/oss-sec/2014/q3/685

Trust: 0.8

url:http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html

Trust: 0.8

url:https://gist.github.com/anonymous/929d622f3b36b00c0be1

Trust: 0.8

url:https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html

Trust: 0.8

url:https://shellshocker.net/#

Trust: 0.8

url:http://support.apple.com/kb/ht6495

Trust: 0.8

url:https://www.barracuda.com/support/techalerts

Trust: 0.8

url:http://www.checkpoint.com/blog/protecting-shellshock/index.html

Trust: 0.8

url:http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044

Trust: 0.8

url:https://www.debian.org/security/2014/dsa-3032

Trust: 0.8

url:http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf

Trust: 0.8

url:http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/

Trust: 0.8

url:http://www.fortiguard.com/advisory/fg-ir-14-030/

Trust: 0.8

url:http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml

Trust: 0.8

url:http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0

Trust: 0.8

url:http://kb.juniper.net/jsa10648

Trust: 0.8

url:http://jpn.nec.com/security-info/av14-003.html

Trust: 0.8

url:http://support.novell.com/security/cve/cve-2014-6271.html

Trust: 0.8

url:https://www.suse.com/support/kb/doc.php?id=7015702

Trust: 0.8

url:http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.522193

Trust: 0.8

url:http://www.ubuntu.com/usn/usn-2362-1/

Trust: 0.8

url:http://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2090740

Trust: 0.8

url:http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org

Trust: 0.8

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2104-6277

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2104-6278

Trust: 0.4

url:http://www.gnu.org/software/bash/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://www.exploit-db.com/exploits/35081/

Trust: 0.1

url:https://security.archlinux.org/cve-2014-6277

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2380-1/

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/252743

Trust: 0.1

url:https://tmc.tippingpoint.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0224

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/km01194258

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/km01194259

Trust: 0.1

url:http://h18013.www1.hp.com/products/servers/management/hpsim/download.html

Trust: 0.1

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng

Trust: 0.1

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.1

url:https://my.vertica.com

Trust: 0.1

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.1

url:http://h20565.www2.hp.com/portal/site/hpsc/template.page/public/psi/swddetail

Trust: 0.1

sources: CERT/CC: VU#252743 // VULMON: CVE-2014-6277 // BID: 70165 // PACKETSTORM: 128716 // PACKETSTORM: 128764 // PACKETSTORM: 128753 // PACKETSTORM: 130988 // PACKETSTORM: 129067 // PACKETSTORM: 128666 // PACKETSTORM: 129438 // PACKETSTORM: 128763 // PACKETSTORM: 129095 // PACKETSTORM: 128762 // PACKETSTORM: 130196 // PACKETSTORM: 130335 // PACKETSTORM: 129073 // PACKETSTORM: 129617 // PACKETSTORM: 128765 // NVD: CVE-2014-6277

CREDITS

HP

Trust: 1.5

sources: PACKETSTORM: 128716 // PACKETSTORM: 128764 // PACKETSTORM: 128753 // PACKETSTORM: 130988 // PACKETSTORM: 129067 // PACKETSTORM: 128666 // PACKETSTORM: 129438 // PACKETSTORM: 128763 // PACKETSTORM: 129095 // PACKETSTORM: 128762 // PACKETSTORM: 130196 // PACKETSTORM: 130335 // PACKETSTORM: 129073 // PACKETSTORM: 129617 // PACKETSTORM: 128765

SOURCES

db:CERT/CCid:VU#252743
db:VULMONid:CVE-2014-6277
db:BIDid:70165
db:PACKETSTORMid:128716
db:PACKETSTORMid:128764
db:PACKETSTORMid:128753
db:PACKETSTORMid:130988
db:PACKETSTORMid:129067
db:PACKETSTORMid:128666
db:PACKETSTORMid:129438
db:PACKETSTORMid:128763
db:PACKETSTORMid:129095
db:PACKETSTORMid:128762
db:PACKETSTORMid:130196
db:PACKETSTORMid:130335
db:PACKETSTORMid:129073
db:PACKETSTORMid:129617
db:PACKETSTORMid:128765
db:NVDid:CVE-2014-6277

LAST UPDATE DATE

2025-10-18T20:56:34.547000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#252743date:2015-04-14T00:00:00
db:VULMONid:CVE-2014-6277date:2018-08-09T00:00:00
db:BIDid:70165date:2015-10-26T16:51:00
db:NVDid:CVE-2014-6277date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#252743date:2014-09-25T00:00:00
db:VULMONid:CVE-2014-6277date:2014-09-27T00:00:00
db:BIDid:70165date:2014-09-27T00:00:00
db:PACKETSTORMid:128716date:2014-10-16T13:33:00
db:PACKETSTORMid:128764date:2014-10-20T17:57:00
db:PACKETSTORMid:128753date:2014-10-20T13:55:00
db:PACKETSTORMid:130988date:2015-03-24T17:07:02
db:PACKETSTORMid:129067date:2014-11-12T18:13:32
db:PACKETSTORMid:128666date:2014-10-14T23:07:16
db:PACKETSTORMid:129438date:2014-12-09T23:15:30
db:PACKETSTORMid:128763date:2014-10-20T17:55:00
db:PACKETSTORMid:129095date:2014-11-13T17:15:31
db:PACKETSTORMid:128762date:2014-10-20T17:44:00
db:PACKETSTORMid:130196date:2015-02-02T17:13:47
db:PACKETSTORMid:130335date:2015-02-10T17:43:19
db:PACKETSTORMid:129073date:2014-11-12T18:14:19
db:PACKETSTORMid:129617date:2014-12-17T18:27:35
db:PACKETSTORMid:128765date:2014-10-20T18:22:00
db:NVDid:CVE-2014-6277date:2014-09-27T22:55:02.660