|
|||
Rule General Information |
---|
Release Date: | 2017-05-12 | |
Rule Name: | GNU Bash Environment Variable Handling Command Execution Vulnerability -1 (CVE-2014-6271) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, aka "ShellShock."。 | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Mac OS, Solaris, Other Unix, FreeBSD, Linux | |
Reference: | SecurityFocusBID:70103 ExploitDB:38849 ExploitDB:39918 ExploitDB:40619 ExploitDB:40938 |
|
Solutions |
---|