|
Description: | | GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, aka "ShellShock.". |
|
Impact: | | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. |
|
Affected OS: | | Network Device, Solaris, FreeBSD, Linux, Other Unix, Mac OS |
|
Reference: | | SecurityFocusBID:70103 ExploitDB:38849 ExploitDB:39918 ExploitDB:40619 ExploitDB:40938
|
|