ID

VAR-201409-1154


CVE

CVE-2014-6278


TITLE

GNU Bash Operating system command injection vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201409-1110

DESCRIPTION

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277. GNU Bash is prone to remote code execution vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Note: HP and the switch vendor recommend running an active version of Fabric OS (FOS) listed on the HP Single Point of Connectivity Knowledge (SPOCK) website ( http://h20272.www2.hp.com/ ) and applying the work-around information provided in the MITIGATION INFORMATION section below to protect HP StoreFabric B-series switches from this vulnerability. - Utilize FOS password policy management to strengthen the complexity, age, and history requirements of switch account passwords. This bulletin will be revised when the update is available. MITIGATION INFORMATION HP recommends the following steps to reduce the risk of this vulnerability: - Place the HP StoreFabric H-series switch and other data center critical infrastructure behind a firewall to disallow access from the Internet. - Change all HP StoreFabric switch default account passwords, including the root passwords, from the default factory passwords. - Examine the list of accounts, including ones on the switch and those existing on remote authentication servers such as RADIUS, LDAP, and TACAS+, to ensure only necessary personnel can gain access to HP StoreFabric H-series switches. Delete guest accounts and temporary accounts created for one-time usage needs. - To avoid possible exploit through the embedded web GUI, QuickTools, disable the web server with the following procedure: NOTE: After completing this procedure, the user will not be able to manage the switch using QuickTools. Login to the Command Line Interface (CLI). Execute the "admin start" command to enter into an admin session. Execute the "set setup services" command and change setting for EmbeddedGUIEnabled to "False". No other firmware stream updates are planned beyond the NX-OS 5.x and 6.x versions listed below for the MDS products. This software versions 6.2(9a) has included the fixes for the vulnerability in HP StoreFabric C-series MDS switches which currently supporting NX-OS 6.X releases. This software version 5.2(8e) has included the fix for the vulnerability in HP C-series MDS switches which currently supporting NX-OS 5.X releases. All MDS and Nexus 5K switches can function in this configuration. Access is available through the console port. Note: All versions of HP Thin Pro and HP Smart Zero Core operating systems prior to version 5.1.0 are affected by these vulnerabilities. Following is a complete list of affected operating systems and Hardware Platforms Affected. HP ThinPro: HP ThinPro 5.0 (released June 2014) HP ThinPro 4.4 (released November 2013) HP ThinPro 4.3 (released June 2013) HP ThinPro 4.2 (released November 2012) HP ThinPro 4.1 (released March 2012) HP ThinPro 3.2 (released November 2010) HP ThinPro 3.1 (released June 2010) HP ThinPro 3.0 (released November 2009) HP ThinPro 2.0 (released 2009) HP ThinPro 1.5 (released 2009) HP ThinPro 1.0 (released 2008) HP Smart Zero Core: HP Smart Zero Core 5.0 (released June 2014) HP Smart Zero Core 4.4 (released November 2013) HP Smart Zero Core 4.3 (released June 2013) HP Smart Zero Core 4.2 (released November 2012) HP Smart Zero Core 4.1 (released March 2012) HP Smart Zero Core 4.0 (released March 2011) Hardware Platforms Affected: HP t620 PLUS Flexible Quad Core Thin Client HP t620 Flexible Dual Core Thin Client HP t620 PLUS Flexible Dual Core Thin Client HP t620 Flexible Quad Core Thin Client HP t520 Flexible Thin Client HP t505 Flexible Thin Client HP t510 Flexible Thin Client HP t410 All-in-One 18.5 RFX/HDX Smart ZC HP t410 Smart Zero Client HP t610 PLUS Flexible Thin Client HP t610 Flexible Thin Client HP t5565 Thin Client HP t5565z Smart Client BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10 CVE-2104-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10 CVE-2104-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has released the following software updates to resolve these vulnerabilities. Product Affected Product Versions Patch Status HP ThinPro and HP Smart Zero Core (X86) v5.1.0 and above No update required; the Bash shell patch is incorporated into the base image. Note: If you participated in the ThinPro 5.1.0 beta program then upgrade to the release version as soon as it becomes available. HP ThinPro and HP Smart Zero Core (x86) v5.0.x A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-5.0-x86.xar . The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe HP ThinPro and HP Smart Zero Core (x86) v4.4.x A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.4-x86.xar . The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe HP ThinPro and HP Smart Zero Core (ARM) v4.4.x A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.4-arm.xar . The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe HP ThinPro and HP Smart Zero Core (X86) v4.1, v4.2, and v4.3 A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.1-4.2-4.3-x86.xar . The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe HP ThinPro and HP Smart Zero Core (ARM) v4.1, v4.2, and v4.3 A component update is currently available through Easy Update as: SecurityUpdate-Shellshock-2.0-all-4.1-4.2-4.3-arm.xar . The update can be also downloaded directly from HP as part of softpaq sp69382 at the following address: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe HP ThinPro and HP Smart Zero Core (X86) v3.1, v3.2, and v3.3 Download softpaq sp69382 from: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe which contains an update package as: bash_4.1-3+deb6u2_i386.deb . HP ThinPro and HP Smart Zero Core (ARM) v3.1, v3.2, and v3.3 Download softpaq sp69382 from: ftp://ftp.hp.com/pub/softpaq/sp69001-69500/sp69382.exe which contains an update package as: bash_4.1-3+deb6u2_armel.deb . HP Product Firmware Version HP StoreEver ESL G3 Tape Libraries with MCB version 2 680H_GS40701 HP StoreEver ESL G3 Tape Libraries with MCB version 1 656H_GS10801 The firmware is customer installable and is available in the Drivers, Software & Firmware section at the following location: http://www.hp.com/support/eslg3 Notes: - Updating the library firmware requires a reboot of the library. - Disable DHCP and only use static IP addressing. ============================================================================ Ubuntu Security Notice USN-2380-1 October 09, 2014 bash vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Several security issues were fixed in Bash. Software Description: - bash: GNU Bourne Again SHell Details: Michal Zalewski discovered that Bash incorrectly handled parsing certain function definitions. If an attacker were able to create an environment variable containing a function definition with a very specific name, these issues could possibly be used to bypass certain environment restrictions and execute arbitrary code. (CVE-2014-6277, CVE-2014-6278) Please note that the previous Bash security update, USN-2364-1, includes a hardening measure that prevents these issues from being used in a Shellshock attack. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: bash 4.3-7ubuntu1.5 Ubuntu 12.04 LTS: bash 4.2-2ubuntu2.6 Ubuntu 10.04 LTS: bash 4.1-2ubuntu3.5 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2380-1 CVE-2014-6277, CVE-2014-6278 Package Information: https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.5 https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.6 https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04558068 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04558068 Version: 1 HPSBMU03246 rev.1 - HP Insight Control for Linux Central Management Server Pre-boot Execution Environment running Bash Shell, Multiple Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-02-02 Last Updated: 2015-02-02 Potential Security Impact: Multiple vulnerabilities Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Insight Control for Linux Central Management Server Pre-boot Execution Environment that could be exploited remotely resulting in Denial of Service (DoS), disclosure of information, and other vulnerabilities. References: CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 CVE-2014-7196 SSRT101742 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control for Linux Central Management Server Pre-boot Execution Environment running Bash Shell BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7196 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following instructions to resolve these vulnerabilities. Follow these steps to update the HP Insight Control for Linux Central Management Server Pre-boot Execution Environment: NOTE: The following procedure updates the bash shell on the Linux Pre-boot Execution Environment. Please update the Bash shell version on the HP Insight Control for Linux Central Management Server also. 1. On the Production RHEL 6.2 OS: a. Prepare temporary directory for Bash update software: # mkdir -p $HOME/tmp/bash # cd $HOME/tmp/bash # pwd <home directory>/tmp/bash b. Download the file 'bash-4.1.2-15.el6_4.2.i686.rpm' for Insight Control for Linux Red Hat 6.2 i386 from https://rhn.redhat.com/errata/RHSA-2014-1311.html to the temporary directory '$HOME/tmp/bash'. c. Extract the Bash update software package. # rpm2cpio bash-4.1.2-15.el6_4.2.i686.rpm| cpio -idmv d. Verify the version of the Bash update software: # ./bin/bash --version GNU bash, version 4.1.2(1)-release (i686-redhat-linux-gnu) e. Verify version dependencies: # ldd ./bin/bash linux-gate.so.1 => (0x008a7000) libtinfo.so.5 => /lib/libtinfo.so.5 (0x00459000) libdl.so.2 => /lib/libdl.so.2 (0x002c0000) libc.so.6 => /lib/libc.so.6 (0x0012e000) /lib/ld-linux.so.2 (0x00108000) f. Create archive file from '/lib' to copy and install on the Insight Control for Linux Central Management Server Pre-boot Execution Environment system: # mkdir $HOME/tmp/lib # cd /lib # cp * $HOME/tmp/lib # cd $HOME/tmp # pwd <home directory>/tmp # tar cvf bash_lib.tar * 2. Download the new archive file '$HOME/tmp/bash_lib.tar' from the Production RHEL 6.2 OS system to the Insight Control for Linux Central Management Server Pre-boot Execution Environment system. 3. On the HP Insight Control for Linux Central Managment Server Pre-boot Execution Environment system: a. Create a temporary folder for the toolkit and copy the toolkit there : # mkdir -p $HOME/tmp/temp-toolkit # cp /usr/share/systemimager/boot/i386/standard/toolkit.tar.gz $HOME/tmp/temp-toolkit b. Extract the file 'toolkit.tar.gz' into the temporary folder: # cd $HOME/tmp/temp-toolkit # tar zxvf toolkit.tar.gz # mv $HOME/tmp/temp-toolkit/toolkit.tar.gz /tmp c. Verify the version of the toolkit Bash: # $HOME/tmp/temp-toolkit/bin/bash --version GNU bash, version 3.2.0(1)-release (i386-pc-linux-gnu) Copyright (C) 2005 Free Software Foundation, Inc. d. Verify dependencies versions: # ldd $HOME/tmp/temp-toolkit/bin/bash linux-gate.so.1 => (0xffffe000) libtermcap.so.2 => /lib/libtermcap.so.2 (0xf7f8c000) libdl.so.2 => /lib/libdl.so.2 (0x008bf000) libc.so.6 => /lib/libc.so.6 (0x00777000) /lib/ld-linux.so.2 (0x00755000) e. Extract the archive 'bash_lib.tar' to directory '$HOME/tmp/bash_lib' . Then copy the bash binary and the library files to their respective locations: # tar xvf $HOME/tmp/bash_lib # cp $HOME/tmp/bash_lib/bash/bash $HOME/tmp/temp-toolkit/bin # cp $HOME/tmp/bash_lib/lib/* $HOME/tmp/temp-toolkit/lib f. Create the updated toolkit gzipped archive file and place in /usr/share/systemimager/boot/i386/standard # tar czvf toolkit.tar.gz * # cp toolkit.tar.gz /usr/share/systemimager/boot/i386/standard HISTORY Version:1 (rev.1) - 2 February 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iEYEARECAAYFAlTP2EgACgkQ4B86/C0qfVnMkQCg8yH4xRTp9ahC3s4vDiCBmKiV JTwAoPl3SC09DPRWwo1zluDWFF1OfMtA =w7+V -----END PGP SIGNATURE----- . This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script. Customers who need to upgrade the firmware of their Superdome X or HP Converged System 900 for SAP HANA should contact HP Technical Support to obtain the firmware or plan to schedule an onsite visit with an HP Services field service professional. Patch and maintain Lightweight Directory Access Protocol (LDAP) and web servers. Use virus scanners, intrusion detection/prevention systems (IDS/IPS), and vulnerability scanners regularly. Apply all recommended HP Firmware updates

Trust: 2.61

sources: NVD: CVE-2014-6278 // BID: 70166 // PACKETSTORM: 128760 // PACKETSTORM: 128765 // PACKETSTORM: 129073 // PACKETSTORM: 128762 // PACKETSTORM: 129095 // PACKETSTORM: 129438 // PACKETSTORM: 128666 // VULMON: CVE-2014-6278 // PACKETSTORM: 129068 // PACKETSTORM: 129069 // PACKETSTORM: 130988 // PACKETSTORM: 128753 // PACKETSTORM: 128606 // PACKETSTORM: 130336 // PACKETSTORM: 128764 // PACKETSTORM: 128752

AFFECTED PRODUCTS

vendor:gnumodel:bashscope:eqversion:1.14.7

Trust: 1.6

vendor:gnumodel:bashscope:eqversion:2.01

Trust: 1.6

vendor:gnumodel:bashscope:eqversion:2.0

Trust: 1.6

vendor:gnumodel:bashscope:eqversion:1.14.4

Trust: 1.6

vendor:gnumodel:bashscope:eqversion:1.14.1

Trust: 1.6

vendor:gnumodel:bashscope:eqversion:1.14.0

Trust: 1.6

vendor:gnumodel:bashscope:eqversion:1.14.6

Trust: 1.6

vendor:gnumodel:bashscope:eqversion:1.14.3

Trust: 1.6

vendor:gnumodel:bashscope:eqversion:1.14.2

Trust: 1.6

vendor:gnumodel:bashscope:eqversion:1.14.5

Trust: 1.6

vendor:gnumodel:bashscope:eqversion:4.2

Trust: 1.3

vendor:gnumodel:bashscope:eqversion:4.0

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:4.1

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:3.0

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.02

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:3.1

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:4.3

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:3.0.16

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:3.2

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.02.1

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:3.2.48

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.05

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.04

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.01.1

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:2.03

Trust: 1.0

vendor:xeroxmodel:workcentrescope:eqversion:7245

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7242

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7238

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7235

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7232

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7228

Trust: 0.3

vendor:xeroxmodel:phaserscope:eqversion:78000

Trust: 0.3

vendor:xeroxmodel:phaserscope:eqversion:67000

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9393

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9303

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9302

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9301

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:11

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:3.2

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:3.1

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:5

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:mcafeemodel:email gateway patchscope:eqversion:7.01

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.0

Trust: 0.3

vendor:mcafeemodel:email gateway hotfixscope:eqversion:6.7.22

Trust: 0.3

vendor:mcafeemodel:email gateway hotfixscope:eqversion:6.7.21

Trust: 0.3

vendor:ibmmodel:ds8000scope:eqversion:0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:hpmodel:insight controlscope:eqversion:0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:gss 4492r global site selectorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:5(2)

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16.2

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16

Trust: 0.3

sources: BID: 70166 // CNNVD: CNNVD-201409-1110 // NVD: CVE-2014-6278

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-6278
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2014-6278
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201409-1110
value: CRITICAL

Trust: 0.6

VULMON: CVE-2014-6278
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-6278
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2014-6278
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULMON: CVE-2014-6278 // CNNVD: CNNVD-201409-1110 // NVD: CVE-2014-6278 // NVD: CVE-2014-6278

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

sources: NVD: CVE-2014-6278

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201409-1110

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201409-1110

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2014-6278

PATCH

title:GNU Bash Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168880

Trust: 0.6

title:Ubuntu Security Notice: bash vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2380-1

Trust: 0.1

title:VMware Security Advisories: VMware product updates address critical Bash security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=86cb6b3955e100fdc9667a7ca916c772

Trust: 0.1

title:Symantec Security Advisories: SA82 : GNU Bash Shellshock Command Injection Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=2b57ceaadfde2a8b03482273e1fd21ea

Trust: 0.1

title:Citrix Security Bulletins: Citrix XenServer Shellshock Security Updateurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=64ae0aae8269062686789e3a3fa1d2bf

Trust: 0.1

title:Tenable Security Advisories: [R7] Tenable Appliance Affected by GNU bash 'Shellshock' Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2014-07

Trust: 0.1

title:Citrix Security Bulletins: Citrix Security Advisory for GNU Bash Shellshock Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=73443a6db89dc66fc6bcb49f85bfd1ab

Trust: 0.1

title:CiscoUCS-Shellshockurl:https://github.com/thatchriseckert/CiscoUCS-Shellshock

Trust: 0.1

title:0day-WriteUp-TryHackme-CTF-Mediumurl:https://github.com/elc4br4/0day-WriteUp-TryHackme-CTF-Medium

Trust: 0.1

title:ShellScanurl:https://github.com/0xICF/ShellScan

Trust: 0.1

title:cvesploiturl:https://github.com/swapravo/cvesploit

Trust: 0.1

title:fabric-shellshockurl:https://github.com/ericlake/fabric-shellshock

Trust: 0.1

title:w-testurl:https://github.com/inspirion87/w-test

Trust: 0.1

title:Xpl-SHELLSHOCK-Ch3ckurl:https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck

Trust: 0.1

title:bashcheckurl:https://github.com/hannob/bashcheck

Trust: 0.1

title:shellshockFixOSXurl:https://github.com/opragel/shellshockFixOSX

Trust: 0.1

title:shocktrooperurl:https://github.com/EvanK/shocktrooper

Trust: 0.1

title:ShellShockHunterurl:https://github.com/MrCl0wnLab/ShellShockHunter

Trust: 0.1

title:shellshocker-pocsurl:https://github.com/mubix/shellshocker-pocs

Trust: 0.1

title:ActiveScanPlusPlusurl:https://github.com/albinowax/ActiveScanPlusPlus

Trust: 0.1

title:afl-cveurl:https://github.com/mrash/afl-cve

Trust: 0.1

title:Threatposturl:https://threatpost.com/researcher-takes-wraps-off-two-undisclosed-shellshock-vulnerabilities-in-bash/108674/

Trust: 0.1

sources: VULMON: CVE-2014-6278 // CNNVD: CNNVD-201409-1110

EXTERNAL IDS

db:NVDid:CVE-2014-6278

Trust: 3.5

db:MCAFEEid:SB10085

Trust: 2.0

db:JUNIPERid:JSA10648

Trust: 2.0

db:SECUNIAid:61641

Trust: 1.7

db:SECUNIAid:61603

Trust: 1.7

db:SECUNIAid:61287

Trust: 1.7

db:SECUNIAid:60055

Trust: 1.7

db:SECUNIAid:61654

Trust: 1.7

db:SECUNIAid:61313

Trust: 1.7

db:SECUNIAid:60044

Trust: 1.7

db:SECUNIAid:58200

Trust: 1.7

db:SECUNIAid:61550

Trust: 1.7

db:SECUNIAid:61780

Trust: 1.7

db:SECUNIAid:61552

Trust: 1.7

db:SECUNIAid:61565

Trust: 1.7

db:SECUNIAid:61312

Trust: 1.7

db:SECUNIAid:60193

Trust: 1.7

db:SECUNIAid:61129

Trust: 1.7

db:SECUNIAid:61703

Trust: 1.7

db:SECUNIAid:60433

Trust: 1.7

db:SECUNIAid:61128

Trust: 1.7

db:SECUNIAid:60063

Trust: 1.7

db:SECUNIAid:61816

Trust: 1.7

db:SECUNIAid:61633

Trust: 1.7

db:SECUNIAid:60034

Trust: 1.7

db:SECUNIAid:61643

Trust: 1.7

db:SECUNIAid:61485

Trust: 1.7

db:SECUNIAid:61503

Trust: 1.7

db:SECUNIAid:62343

Trust: 1.7

db:SECUNIAid:60325

Trust: 1.7

db:SECUNIAid:61291

Trust: 1.7

db:SECUNIAid:61328

Trust: 1.7

db:SECUNIAid:61283

Trust: 1.7

db:SECUNIAid:60024

Trust: 1.7

db:SECUNIAid:61442

Trust: 1.7

db:SECUNIAid:59961

Trust: 1.7

db:SECUNIAid:61471

Trust: 1.7

db:SECUNIAid:61857

Trust: 1.7

db:SECUNIAid:61065

Trust: 1.7

db:SECUNIAid:59907

Trust: 1.7

db:SECUNIAid:62312

Trust: 1.7

db:PACKETSTORMid:128567

Trust: 1.7

db:PACKETSTORMid:137344

Trust: 1.7

db:JVNid:JVN55667175

Trust: 1.7

db:JVNDBid:JVNDB-2014-000126

Trust: 1.7

db:EXPLOIT-DBid:39568

Trust: 1.6

db:EXPLOIT-DBid:39887

Trust: 1.6

db:CNNVDid:CNNVD-201409-1110

Trust: 0.6

db:BIDid:70166

Trust: 0.4

db:JUNIPERid:JSA10661

Trust: 0.3

db:ICS CERTid:ICSA-14-269-01

Trust: 0.3

db:CERT/CCid:VU#252743

Trust: 0.3

db:EXPLOITDBid:39568

Trust: 0.1

db:EXPLOITDBid:39887

Trust: 0.1

db:VULMONid:CVE-2014-6278

Trust: 0.1

db:PACKETSTORMid:128764

Trust: 0.1

db:PACKETSTORMid:130336

Trust: 0.1

db:PACKETSTORMid:128606

Trust: 0.1

db:PACKETSTORMid:128753

Trust: 0.1

db:PACKETSTORMid:130988

Trust: 0.1

db:PACKETSTORMid:129069

Trust: 0.1

db:PACKETSTORMid:129068

Trust: 0.1

db:PACKETSTORMid:128752

Trust: 0.1

db:PACKETSTORMid:128666

Trust: 0.1

db:PACKETSTORMid:129438

Trust: 0.1

db:PACKETSTORMid:129095

Trust: 0.1

db:PACKETSTORMid:128762

Trust: 0.1

db:PACKETSTORMid:129073

Trust: 0.1

db:PACKETSTORMid:128765

Trust: 0.1

db:PACKETSTORMid:128760

Trust: 0.1

sources: VULMON: CVE-2014-6278 // BID: 70166 // PACKETSTORM: 128764 // PACKETSTORM: 130336 // PACKETSTORM: 128606 // PACKETSTORM: 128753 // PACKETSTORM: 130988 // PACKETSTORM: 129069 // PACKETSTORM: 129068 // PACKETSTORM: 128752 // PACKETSTORM: 128666 // PACKETSTORM: 129438 // PACKETSTORM: 129095 // PACKETSTORM: 128762 // PACKETSTORM: 129073 // PACKETSTORM: 128765 // PACKETSTORM: 128760 // CNNVD: CNNVD-201409-1110 // NVD: CVE-2014-6278

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685749

Trust: 2.0

url:http://www.vmware.com/security/advisories/vmsa-2014-0010.html

Trust: 2.0

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10648

Trust: 2.0

url:http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685914

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897

Trust: 2.0

url:http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685604

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686131

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686246

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687079

Trust: 2.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10085

Trust: 2.0

url:http://www.ubuntu.com/usn/usn-2380-1

Trust: 1.8

url:https://www.exploit-db.com/exploits/39568/

Trust: 1.8

url:https://security-tracker.debian.org/tracker/cve-2014-6278

Trust: 1.7

url:http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=1147414

Trust: 1.7

url:https://www.suse.com/support/shellshock/

Trust: 1.7

url:http://support.novell.com/security/cve/cve-2014-6278.html

Trust: 1.7

url:http://secunia.com/advisories/61641

Trust: 1.7

url:http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html

Trust: 1.7

url:https://kb.bluecoat.com/index?page=content&id=sa82

Trust: 1.7

url:http://secunia.com/advisories/61485

Trust: 1.7

url:http://secunia.com/advisories/59907

Trust: 1.7

url:http://secunia.com/advisories/61654

Trust: 1.7

url:http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html

Trust: 1.7

url:http://secunia.com/advisories/61565

Trust: 1.7

url:http://www.novell.com/support/kb/doc.php?id=7015721

Trust: 1.7

url:http://secunia.com/advisories/61643

Trust: 1.7

url:http://secunia.com/advisories/61503

Trust: 1.7

url:http://secunia.com/advisories/61633

Trust: 1.7

url:http://secunia.com/advisories/61552

Trust: 1.7

url:http://secunia.com/advisories/61703

Trust: 1.7

url:http://secunia.com/advisories/61283

Trust: 1.7

url:http://secunia.com/advisories/61603

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141330468527613&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141345648114150&w=2

Trust: 1.7

url:https://support.citrix.com/article/ctx200217

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879

Trust: 1.7

url:http://secunia.com/advisories/60034

Trust: 1.7

url:http://secunia.com/advisories/61816

Trust: 1.7

url:http://secunia.com/advisories/61128

Trust: 1.7

url:http://secunia.com/advisories/61313

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685733

Trust: 1.7

url:http://secunia.com/advisories/61442

Trust: 1.7

url:http://secunia.com/advisories/61287

Trust: 1.7

url:https://support.citrix.com/article/ctx200223

Trust: 1.7

url:http://secunia.com/advisories/60055

Trust: 1.7

url:http://secunia.com/advisories/61129

Trust: 1.7

url:http://secunia.com/advisories/61780

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686479

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685541

Trust: 1.7

url:https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html

Trust: 1.7

url:http://secunia.com/advisories/61471

Trust: 1.7

url:http://secunia.com/advisories/58200

Trust: 1.7

url:http://secunia.com/advisories/61328

Trust: 1.7

url:http://secunia.com/advisories/61857

Trust: 1.7

url:http://secunia.com/advisories/60193

Trust: 1.7

url:http://secunia.com/advisories/61065

Trust: 1.7

url:http://secunia.com/advisories/61550

Trust: 1.7

url:http://secunia.com/advisories/60325

Trust: 1.7

url:http://secunia.com/advisories/61312

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686494

Trust: 1.7

url:http://secunia.com/advisories/60063

Trust: 1.7

url:http://secunia.com/advisories/61291

Trust: 1.7

url:http://secunia.com/advisories/60044

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686445

Trust: 1.7

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk102673&src=securityalerts

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361

Trust: 1.7

url:http://secunia.com/advisories/60433

Trust: 1.7

url:http://secunia.com/advisories/60024

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141383353622268&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141383304022067&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141383244821813&w=2

Trust: 1.7

url:http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141450491804793&w=2

Trust: 1.7

url:http://jvn.jp/en/jp/jvn55667175/index.html

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141383081521087&w=2

Trust: 1.7

url:http://www.qnap.com/i/en/support/con_show.php?cid=61

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141383026420882&w=2

Trust: 1.7

url:http://jvndb.jvn.jp/jvndb/jvndb-2014-000126

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141383196021590&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141383465822787&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141577137423233&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141577241923505&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141576728022234&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141577297623641&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141585637922673&w=2

Trust: 1.7

url:http://secunia.com/advisories/62312

Trust: 1.7

url:http://secunia.com/advisories/59961

Trust: 1.7

url:http://secunia.com/advisories/62343

Trust: 1.7

url:http://linux.oracle.com/errata/elsa-2014-3093

Trust: 1.7

url:http://linux.oracle.com/errata/elsa-2014-3094

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=142358026505815&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=142358078406056&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141879528318582&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=142118135300698&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=142721162228379&w=2

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:164

Trust: 1.7

url:http://packetstormsecurity.com/files/137344/sun-secure-global-desktop-oracle-global-desktop-shellshock.html

Trust: 1.7

url:https://www.exploit-db.com/exploits/39887/

Trust: 1.7

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04518183

Trust: 1.7

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04497075

Trust: 1.7

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-6277

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-6278

Trust: 1.5

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 1.4

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 1.4

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-7169

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-6271

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-7186

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-7187

Trust: 1.2

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2014-6278

Trust: 1.0

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea

Trust: 0.4

url:http://lcamtuf.blogspot.de/2014/09/bash-bug-apply-unofficial-patch-now.html

Trust: 0.3

url:http://www.gnu.org/software/bash/

Trust: 0.3

url:https://lists.gnu.org/archive/html/bug-bash/2014-10/msg00040.html

Trust: 0.3

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk102673

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&id=kb83017

Trust: 0.3

url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash

Trust: 0.3

url:http://lcamtuf.blogspot.in/2014/09/quick-notes-about-bash-bug-its-impact.html

Trust: 0.3

url:http://www.fortiguard.com/advisory/fg-ir-14-030/

Trust: 0.3

url:https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_vulnerabilities_in_bash_affect_certain_qlogic_products_that_ibm_resells_for_bladecenter_and_flex_system_products_cve_2014_6271_c

Trust: 0.3

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/archive/hw-372538.htm

Trust: 0.3

url:http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html?ref=rss

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=ssg1s1004932

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21686433

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=isg3t1021361

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21686494

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21686445

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=ssg1s1004903

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004928

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004911

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21686479

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04497075

Trust: 0.3

url:http://seclists.org/fulldisclosure/2014/oct/25

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10661&cat=sirt_1&actp=list

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100183172

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/supplement-icsa-14-269-01

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/bluu-9paps5

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479398

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479402

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479601

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479505

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479492

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04475942

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471532

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04488200

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04478866

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479536

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04540692

Trust: 0.3

url:http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04561445

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471546

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471538

Trust: 0.3

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04497042

Trust: 0.3

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04512907

Trust: 0.3

url:http://seclists.org/bugtraq/2015/feb/76

Trust: 0.3

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04558068

Trust: 0.3

url:http://seclists.org/bugtraq/2015/feb/77

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04487558

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04487573

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04496383

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/bluu-9paptm

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/bluu-9paptz

Trust: 0.3

url:https://www.xerox.com/download/security/security-bulletin/1a2e5-5116a33c2fb27/cert_security_mini-_bulletin_xrx15k_for_77xx_r15-03_v1.0.pdf

Trust: 0.3

url:https://www.xerox.com/download/security/security-bulletin/2b8d8-513128526dd97/cert_security_mini-_bulletin_xrx15m_for_wc75xx_v1_1.pdf

Trust: 0.3

url:https://www.xerox.com/download/security/security-bulletin/2eeef-51056e459c6d8/cert_security_mini-_bulletin_xrx15h_for_p7800_v1_0.pdf

Trust: 0.3

url:https://www.xerox.com/download/security/security-bulletin/2a20e-5105457a515cc/cert_security_mini-_bulletin_xrx15e_for_wc57xx_v1_0.pdf

Trust: 0.3

url:https://www.xerox.com/download/security/security-bulletin/2a901-510567b876a35/cert_security_mini-_bulletin_xrx15g_for_p6700_v1_0.pdf

Trust: 0.3

url:https://www.xerox.com/download/security/security-bulletin/29a7e-50e49f9c009f9/cert_security_mini_bulletin_xrx14g_for_77xx_v1.1.pdf

Trust: 0.3

url:https://www.xerox.com/download/security/security-bulletin/1a7a1-50f12e334b734/cert_security_mini-_bulletin_xrx14h_for_wc59xx_v1.pdf

Trust: 0.3

url:https://www.xerox.com/download/security/security-bulletin/2df3c-51055b159fd50/cert_security_mini_bulletin_xrx15f_for_connectkey_1.5_v1-01.pdf

Trust: 0.3

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-377648.htm

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004982

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004879

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685873

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21686132

Trust: 0.3

url:http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096533

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21686024

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686037

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21685733

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686171

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21686098

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685875

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=nas8n1020272

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21685541

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004905

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685673

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21685837

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687971

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685691

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004933

Trust: 0.3

url:http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096503

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004945

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100183088

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2104-6277

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2104-6278

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://www.securityfocus.com/bid/70166

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=35880

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2380-1/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0224

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-1311.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7196

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.6

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.5

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.5

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse

Trust: 0.1

url:http://www.hp.com/support/eslg3

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/km01194259

Trust: 0.1

url:http://h20565.www2.hp.com/portal/site/hpsc/template.page/public/psi/swddetail

Trust: 0.1

url:http://h20272.www2.hp.com/

Trust: 0.1

sources: VULMON: CVE-2014-6278 // BID: 70166 // PACKETSTORM: 128764 // PACKETSTORM: 130336 // PACKETSTORM: 128606 // PACKETSTORM: 128753 // PACKETSTORM: 130988 // PACKETSTORM: 129069 // PACKETSTORM: 129068 // PACKETSTORM: 128752 // PACKETSTORM: 128666 // PACKETSTORM: 129438 // PACKETSTORM: 129095 // PACKETSTORM: 128762 // PACKETSTORM: 129073 // PACKETSTORM: 128765 // PACKETSTORM: 128760 // CNNVD: CNNVD-201409-1110 // NVD: CVE-2014-6278

CREDITS

HP

Trust: 1.4

sources: PACKETSTORM: 128764 // PACKETSTORM: 130336 // PACKETSTORM: 128753 // PACKETSTORM: 130988 // PACKETSTORM: 129069 // PACKETSTORM: 129068 // PACKETSTORM: 128752 // PACKETSTORM: 128666 // PACKETSTORM: 129438 // PACKETSTORM: 129095 // PACKETSTORM: 128762 // PACKETSTORM: 129073 // PACKETSTORM: 128765 // PACKETSTORM: 128760

SOURCES

db:VULMONid:CVE-2014-6278
db:BIDid:70166
db:PACKETSTORMid:128764
db:PACKETSTORMid:130336
db:PACKETSTORMid:128606
db:PACKETSTORMid:128753
db:PACKETSTORMid:130988
db:PACKETSTORMid:129069
db:PACKETSTORMid:129068
db:PACKETSTORMid:128752
db:PACKETSTORMid:128666
db:PACKETSTORMid:129438
db:PACKETSTORMid:129095
db:PACKETSTORMid:128762
db:PACKETSTORMid:129073
db:PACKETSTORMid:128765
db:PACKETSTORMid:128760
db:CNNVDid:CNNVD-201409-1110
db:NVDid:CVE-2014-6278

LAST UPDATE DATE

2025-11-26T21:38:49.409000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2014-6278date:2021-11-17T00:00:00
db:BIDid:70166date:2016-07-05T21:53:00
db:CNNVDid:CNNVD-201409-1110date:2021-11-08T00:00:00
db:NVDid:CVE-2014-6278date:2025-10-22T01:16:02.357

SOURCES RELEASE DATE

db:VULMONid:CVE-2014-6278date:2014-09-30T00:00:00
db:BIDid:70166date:2014-09-27T00:00:00
db:PACKETSTORMid:128764date:2014-10-20T17:57:00
db:PACKETSTORMid:130336date:2015-02-10T17:43:27
db:PACKETSTORMid:128606date:2014-10-09T23:44:16
db:PACKETSTORMid:128753date:2014-10-20T13:55:00
db:PACKETSTORMid:130988date:2015-03-24T17:07:02
db:PACKETSTORMid:129069date:2014-11-12T18:13:47
db:PACKETSTORMid:129068date:2014-11-12T18:13:39
db:PACKETSTORMid:128752date:2014-10-20T13:14:00
db:PACKETSTORMid:128666date:2014-10-14T23:07:16
db:PACKETSTORMid:129438date:2014-12-09T23:15:30
db:PACKETSTORMid:129095date:2014-11-13T17:15:31
db:PACKETSTORMid:128762date:2014-10-20T17:44:00
db:PACKETSTORMid:129073date:2014-11-12T18:14:19
db:PACKETSTORMid:128765date:2014-10-20T18:22:00
db:PACKETSTORMid:128760date:2014-10-20T17:03:00
db:CNNVDid:CNNVD-201409-1110date:2014-09-30T00:00:00
db:NVDid:CVE-2014-6278date:2014-09-30T10:55:04.723