RULE(RULE ID:336887)

Rule General Information
Release Date: 2022-07-31
Rule Name: Shellshock Remote Command Injection Vulnerability (CVE-2014-6271)
Severity:
CVE ID:
Rule Protection Details
Description: GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, aka "ShellShock.".
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: ExploitDB:40938
https://access.redhat.com/articles/1200223
https://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
http://www.qnap.com/i/en/support/con_show.php
Solutions
More advisories have been published on the website, please visit for more suggestions:
http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-025
http://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-048
http://ftp.gnu.org/pub/gnu/bash/bash-4.1-patches/bash41-012
http://ftp.gnu.org/pub/gnu/bash/bash-4.0-patches/bash40-039
http://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-052
http://ftp.gnu.org/pub/gnu/bash/bash-3.1-patches/bash31-018
http://ftp.gnu.org/pub/gnu/bash/bash-3.0-patches/bash30-017