VAR-201409-1154

Vulnerability from variot - Updated: 2026-03-05 23:09

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277. QNAP Systems, Inc. Provided by QTS teeth, Turbo NAS for OS is. QTS for, GNU Bash Vulnerability (JVNVU#97219505) caused by OS Command injection vulnerability (CWE-78) Exists. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : University of Electro-Communications Wakisaka Yuki MrAny application permission OS The command may be executed. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script. Customers who need to upgrade the firmware of their Superdome X or HP Converged System 900 for SAP HANA should contact HP Technical Support to obtain the firmware or plan to schedule an onsite visit with an HP Services field service professional.

NOTE: HP strongly recommends implementing the following security best practices to help reduce both known and future security vulnerability risks:

Isolate the HP Superdome X or HP Converged System 900 for SAP HANA's management network by keeping it separate from the data or production network, and not connecting it directly to the Internet without additional access authentication. Patch and maintain Lightweight Directory Access Protocol (LDAP) and web servers. Use virus scanners, intrusion detection/prevention systems (IDS/IPS), and vulnerability scanners regularly. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04558068

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04558068 Version: 1

HPSBMU03246 rev.1 - HP Insight Control for Linux Central Management Server Pre-boot Execution Environment running Bash Shell, Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2015-02-02 Last Updated: 2015-02-02

Potential Security Impact: Multiple vulnerabilities

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Insight Control for Linux Central Management Server Pre-boot Execution Environment that could be exploited remotely resulting in Denial of Service (DoS), disclosure of information, and other vulnerabilities.

References:

CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 CVE-2014-7196 SSRT101742

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control for Linux Central Management Server Pre-boot Execution Environment running Bash Shell

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7196 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following instructions to resolve these vulnerabilities.

Follow these steps to update the HP Insight Control for Linux Central Management Server Pre-boot Execution Environment:

NOTE: The following procedure updates the bash shell on the Linux Pre-boot Execution Environment. On the Production RHEL 6.2 OS:

a. Prepare temporary directory for Bash update software:

mkdir -p $HOME/tmp/bash

cd $HOME/tmp/bash

pwd

/tmp/bash

b. Download the file 'bash-4.1.2-15.el6_4.2.i686.rpm' for Insight Control for Linux Red Hat 6.2 i386 from https://rhn.redhat.com/errata/RHSA-2014-1311.html to the temporary directory '$HOME/tmp/bash'.

c. Extract the Bash update software package.

rpm2cpio bash-4.1.2-15.el6_4.2.i686.rpm| cpio -idmv

d. Verify the version of the Bash update software:

./bin/bash --version

GNU bash, version 4.1.2(1)-release (i686-redhat-linux-gnu)

e. Verify version dependencies:

ldd ./bin/bash

linux-gate.so.1 => (0x008a7000) libtinfo.so.5 => /lib/libtinfo.so.5 (0x00459000) libdl.so.2 => /lib/libdl.so.2 (0x002c0000) libc.so.6 => /lib/libc.so.6 (0x0012e000) /lib/ld-linux.so.2 (0x00108000)

f. Create archive file from '/lib' to copy and install on the Insight Control for Linux Central Management Server Pre-boot Execution Environment system:

mkdir $HOME/tmp/lib

cd /lib

cp * $HOME/tmp/lib

cd $HOME/tmp

pwd

/tmp

tar cvf bash_lib.tar *

  1. Download the new archive file '$HOME/tmp/bash_lib.tar' from the Production RHEL 6.2 OS system to the Insight Control for Linux Central Management Server Pre-boot Execution Environment system. On the HP Insight Control for Linux Central Managment Server Pre-boot Execution Environment system:

a. Create a temporary folder for the toolkit and copy the toolkit there :

mkdir -p $HOME/tmp/temp-toolkit

cp /usr/share/systemimager/boot/i386/standard/toolkit.tar.gz

$HOME/tmp/temp-toolkit

b. Extract the file 'toolkit.tar.gz' into the temporary folder:

cd $HOME/tmp/temp-toolkit

tar zxvf toolkit.tar.gz

mv $HOME/tmp/temp-toolkit/toolkit.tar.gz /tmp

c. Verify the version of the toolkit Bash:

$HOME/tmp/temp-toolkit/bin/bash --version

GNU bash, version 3.2.0(1)-release (i386-pc-linux-gnu) Copyright (C) 2005 Free Software Foundation, Inc.

d. Verify dependencies versions:

ldd $HOME/tmp/temp-toolkit/bin/bash

linux-gate.so.1 => (0xffffe000) libtermcap.so.2 => /lib/libtermcap.so.2 (0xf7f8c000) libdl.so.2 => /lib/libdl.so.2 (0x008bf000) libc.so.6 => /lib/libc.so.6 (0x00777000) /lib/ld-linux.so.2 (0x00755000)

e. Extract the archive 'bash_lib.tar' to directory '$HOME/tmp/bash_lib' . Then copy the bash binary and the library files to their respective locations:

tar xvf $HOME/tmp/bash_lib

cp $HOME/tmp/bash_lib/bash/bash $HOME/tmp/temp-toolkit/bin

cp $HOME/tmp/bash_lib/lib/* $HOME/tmp/temp-toolkit/lib

f. Create the updated toolkit gzipped archive file and place in /usr/share/systemimager/boot/i386/standard

tar czvf toolkit.tar.gz *

cp toolkit.tar.gz /usr/share/systemimager/boot/i386/standard

HISTORY Version:1 (rev.1) - 2 February 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. ============================================================================ Ubuntu Security Notice USN-2380-1 October 09, 2014

bash vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in Bash.

Software Description: - bash: GNU Bourne Again SHell

Details:

Michal Zalewski discovered that Bash incorrectly handled parsing certain function definitions. If an attacker were able to create an environment variable containing a function definition with a very specific name, these issues could possibly be used to bypass certain environment restrictions and execute arbitrary code. (CVE-2014-6277, CVE-2014-6278)

Please note that the previous Bash security update, USN-2364-1, includes a hardening measure that prevents these issues from being used in a Shellshock attack.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS: bash 4.3-7ubuntu1.5

Ubuntu 12.04 LTS: bash 4.2-2ubuntu2.6

Ubuntu 10.04 LTS: bash 4.1-2ubuntu3.5

In general, a standard system update will make all the necessary changes.

References: http://www.ubuntu.com/usn/usn-2380-1 CVE-2014-6277, CVE-2014-6278

Package Information: https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.5 https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.6 https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.5 . -----BEGIN PGP SIGNED MESSAGE-----

CA20141001-01: Security Notice for Bash Shellshock Vulnerability

Issued: October 01, 2014 Updated: October 03, 2014

CA Technologies is investigating multiple GNU Bash vulnerabilities, referred to as the "Shellshock" vulnerabilities, which were publicly disclosed on September 24-27, 2014. CVE identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, and CVE-2014-6278 have been assigned to these vulnerabilities.

The CA Technologies Enterprise Information Security team has led a global effort to identify and remediate systems and products discovered with these vulnerabilities. We continue to patch our systems as fixes become available, and we are providing fixes for affected CA Technologies products.

CA Technologies continues to aggressively scan our environments (including servers, networks, external facing applications, and SaaS environments) to proactively monitor, identify, and remediate any vulnerability when necessary.

Risk Rating

High

Platform

AIX Android (not vulnerable, unless rooted) Apple iOS (not vulnerable unless jailbroken) Linux Mac OS X Solaris Windows (not vulnerable unless Cygwin or similar ported Linux tools with Bash shell are installed) Other UNIX/BSD based systems if Bash is installed Any other OS or JeOS that utilizes Bash

Affected Products

The following products have been identified as potentially vulnerable, and we have made fixes available for all of these products.

CA API Management (Linux appliance only)

CA Application Performance Management (TIM is the only affected APM component)

CA Application Performance Management Cloud Monitor

CA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM)

CA Layer 7 products (API Gateway, Mobile Access Gateway, API Management Portal)

CA User Activity Reporting Module (Enterprise Log Manager)

Note: This security notice will be updated if other CA Technologies products are determined to be vulnerable.

In most cases, the Bash vulnerabilities will need to be patched by OS vendors. Exceptions may include CA Technologies appliances, and software products that include Linux, UNIX or Mac OS X based operating systems (that include Bash).

Affected Components

CentOS Cygwin GNU Bash Red Hat Enterprise Linux SUSE Linux

Non-Affected Products

IMPORTANT NOTE: This listing includes only a small subset of the unaffected CA Technologies products. We're including unaffected products that customers have already inquired about. While the following CA Technologies products are not directly affected by the Bash vulnerabilities, the underlying operating systems that CA Technologies software is installed on may be vulnerable. We strongly encourage our customers to follow the recommendations provided by their vendors for all operating systems they utilize.

All CA SaaS / On Demand products were either not vulnerable or have already been patched.

CA AHS / PaymentMinder - AHS App is not vulnerable. The AHS app does not execute CGI scripts, or spawn or execute shell commands from within the app. AHS infrastructure already patched.

CA Asset Portfolio Management

CA AuthMinder (Arcot WebFort)

CA AuthMinder for Business Users

CA AuthMinder for Consumers

CA AutoSys products - We use the bash shell that comes with the operating system and the customer is responsible for patching their OS. Additionally, the agents themselves do not distribute any scripts that use bash.

CA Clarity On Demand

CA CloudMinder - CloudMinder does not include the Bash Shell in BoM, or use it, but because we are deployed on RHEL, customers may be indirectly affected. Customers using RHEL should apply patches provided by Red Hat.

CA Console Management for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI.

CA ControlMinder

CA DataMinder (formerly DLP) products – Software and appliance confirmed not vulnerable. Note: Linux Agents shipped, but no public SSH or Web apps are used in these agents. Customers should patch bash shell on any Linux server with DataMinder agents. DataMinder agents should continue to function normally.

CA Digital Payments SaaS (previously patched)

CA Directory

CA eCommerce SaaS / On Demand (previously patched)

CA Endevor Software Change Manager

CA Federation (formerly SiteMinder Federation)

CA GovernanceMinder

CA IdentityMinder

CA Infrastructure Management

CA JCLCheck

CA Job Management for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI.

CA NetQoS GigaStor Observer Expert

CA Network Flow Analysis

CA Performance Management for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI.

CA RiskMinder

CA Service Desk Manager

CA Service Operations Insight (SOI)

CA SiteMinder

CA SOLVE:Access

CA Spectrum for Linux - Not vulnerable. Be sure to apply bash fixes from your underlying operating system vendor.

CA Strong Authentication

CA System Watchdog for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI.

CA Top Secret

CA Universal Job Management Agent for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI.

CA Virtual Assurance for Infrastructure Managers (VAIM)

Solution

CA Technologies has issued the following fixes to address the vulnerabilities.

CA API Management: Patches for Linux appliance are available through CA Support to customers of Gateway (applicable for all versions – 6.1.5, 6.2, 7.0, 7.1, 8.0, 8.1, 8.1.1, 8.1.02).

CA Application Performance Management: KB article for APM TIM has been published. APM TIM is the only part of APM that was affected. Refer to TEC618037.

CA Application Performance Management Cloud Monitor: New images are available for subscribers. Download the latest OPMS version 8.2.1.5. For assistance, contact CA Support.

CA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM): Very low risk. 9.6 is not affected. 9.5 Installation uses Bash. We do not use Bash at all for the CEM operating system that we have shipped in the past. This means that customers who patch the OS will not impact the ability of the CEM TIMsoft from operating. However prior to version 9.6, the TIM installation script does use the bash shell. See new KB article TEC618037 for additional information.

CA Layer 7 (API Gateway, Mobile Access Gateway, API Management Portal): Fixes for all Bash vulnerabilities and a security bulletin are available on the Layer 7 Support website.

CA User Activity Reporting Module (Enterprise Log Manager): All 12.5 and 12.6 GA versions are potentially affected. Patches provided on 2014-09-30. To get the patch, use the OS update functionality to get the latest R12.6 SP1 subscription update. Note that you can update R12.5 SPx with the R12.6 SP1 OS update. For assistance, contact CA Support.

Workaround

None

To help mitigate the risk, we do strongly encourage all customers to follow patch management best practices, and in particular for operating systems affected by the Bash Shellshock vulnerabilities.

References

CVE-2014-6271 - Bash environment variable command injection CVE-2014-7169 - Bash environment variable incomplete fix for CVE-2014-6271 CVE-2014-7186 - Bash parser redir_stack memory corruption CVE-2014-7187 - Bash nested flow control constructs off-by-one CVE-2014-6277 - Bash untrusted pointer use uninitialized memory CVE-2014-6278 - Bash environment variable command injection

CA20141001-01: Security Notice for Bash Shellshock Vulnerability https://support.ca.com/irj/portal/anonymous/phpsbpldgpg

Change History

v1.0: 2014-10-01, Initial Release v1.1: 2014-10-02, Added AuthMinder, Strong Authentication, VAIM, Clarity OD, All SaaS/OD products to list of Non-Affected Products. v1.2: 2014-10-03, Added RiskMinder to Non-Affected Products. Updated UARM solution info.

If additional information is required, please contact CA Technologies Support at https://support.ca.com.

If you discover a vulnerability in CA Technologies products, please report your findings to the CA Technologies Product Vulnerability Response Team at vuln@ca.com. PGP key: support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782

Security Notices https://support.ca.com/irj/portal/anonymous/phpsbpldgpg

Regards, Ken Williams Director, Product Vulnerability Response Team CA Technologies | One CA Plaza | Islandia, NY 11749 | www.ca.com Ken.Williams@ca.com | vuln@ca.com

Copyright © 2014 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. All other trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

-----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15238) Charset: utf-8

wsBVAwUBVDK+PZI1FvIeMomJAQFl/Af/TqrSE/h4r3gs9PwrWKdt21PCRI3za9Lx M5ZyTdVDIQ9ybgPkLqsovNRPgVqd7zwDHsx0rzvF5Y82uO+vQ63BuEV2GnczAax/ EiAW4WVxUgWG+lAowGV55Of8ruv/gOiAWTjFhkqpsyVg96ZMw2HLG62IwZL1j0qa oLCu0y3VrGvqH0g2hi75QwHAjNCdlEsD4onUqTCc9cRTdLwFCZrUQ8KTrqIL7LK5 Uo5T9C1UeAyNTo3KiJ/zw3BCOTkpl99dmg3NW0onU/1r1CXdlyS7opLB+GJ+xGwP xRQdUsOIhzfRzx7bsao2D43IhDnzJBBFJHdeMPo18WBTfJ7aUgBwGQ== =B62b -----END PGP SIGNATURE----- .

HP Product Firmware Version

HP StoreEver ESL G3 Tape Libraries with MCB version 2 680H_GS40701

HP StoreEver ESL G3 Tape Libraries with MCB version 1 656H_GS10801

The firmware is customer installable and is available in the Drivers, Software & Firmware section at the following location:

http://www.hp.com/support/eslg3

Notes:

- Updating the library firmware requires a reboot of the library.
  • Disable DHCP and only use static IP addressing. No other firmware stream updates are planned beyond the NX-OS 5.x and 6.x versions listed below for the MDS products. This software versions 6.2(9a) has included the fixes for the vulnerability in HP StoreFabric C-series MDS switches which currently supporting NX-OS 6.X releases. This software version 5.2(8e) has included the fix for the vulnerability in HP C-series MDS switches which currently supporting NX-OS 5.X releases. This bulletin will be revised when these updates become available.

MITIGATION INFORMATION

If updating to a NX-OS version containing the fix is not currently possible, HP recommends the following steps to reduce the risk of this vulnerability:

The "ssh" or "telnet" features may be disabled by the admin user. All MDS and Nexus 5K switches can function in this configuration. Access is available through the console port.

HP Vertica AMI's and Virtual Machines prior to v7.1.1-0.

HP has released the following updates to resolve this vulnerability for HP Vertica products.

Update to the latest VM image available at: https://my.vertica.com

For customers using the AMI version HP Vertica Analytics platform, please install the latest image available at Amazon. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."

Copyright 2014 Hewlett-Packard Development Company, L.P.

Note: HP and the switch vendor recommend running an active version of Fabric OS (FOS) listed on the HP Single Point of Connectivity Knowledge (SPOCK) website ( http://h20272.www2.hp.com/ ) and applying the work-around information provided in the MITIGATION INFORMATION section below to protect HP StoreFabric B-series switches from this vulnerability.

Fabric OS (FOS) v7.3.0b (This version will be available soon and this bulletin will revised at that time)

The following focused fix FOS versions are available for the previously released versions and have been renamed to include an additional hexadecimal character appended to the FOS version on which it is based:

FOS v7.2.1c1
FOS v7.2.0d6
FOS v7.1.2b1
FOS v7.1.1c1
FOS v7.1.0cb
FOS v7.0.2e1
FOS v7.0.0d1
FOS v6.4.3f3
FOS v6.4.2a3
FOS v6.2.2f9

MITIGATION INFORMATION

HP recommends the following steps to reduce the risk of this vulnerability:

- Place the HP StoreFabric SAN switch and other data center critical

infrastructure behind a firewall to disallow access from the Internet. - Change all HP StoreFabric switch default account passwords, including the root passwords, from the default factory passwords. - Examine the list of accounts, including ones on the switch and those existing on remote authentication servers such as RADIUS, LDAP, and TACAS+, to ensure only necessary personnel can gain access to HP StoreFabric FOS switches. Delete guest accounts and temporary accounts created for one-time usage needs. - Utilize FOS password policy management to strengthen the complexity, age, and history requirements of switch account passwords

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "gnu",
        "version": "1.14.7"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "gnu",
        "version": "2.01"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "gnu",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "gnu",
        "version": "1.14.4"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "gnu",
        "version": "1.14.1"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "gnu",
        "version": "1.14.0"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "gnu",
        "version": "1.14.6"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "gnu",
        "version": "1.14.3"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "gnu",
        "version": "1.14.2"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "gnu",
        "version": "1.14.5"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gnu",
        "version": "4.2"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "4.0"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "4.1"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "3.0"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "2.02"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "3.1"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "4.3"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "3.0.16"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "3.2"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "2.02.1"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "3.2.48"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "2.05"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "2.04"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "2.01.1"
      },
      {
        "_id": null,
        "model": "bash",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "2.03"
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "avaya",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "barracuda",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "blue coat",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "centos",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "check point",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cygwin",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian gnu linux",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "dell computer",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "extreme",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "f5",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fireeye",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fortinet",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gnu bash",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "juniper",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mageia",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mcafee",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "monroe",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "niksun",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "novell",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "oracle",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "palo alto",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "qnap security",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse linux",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware linux",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sophos",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "trend micro",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubuntu",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "vmware",
        "version": null
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xirrus",
        "version": null
      },
      {
        "_id": null,
        "model": "qts",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "qnap",
        "version": "4.1.1 build 0927  and earlier"
      },
      {
        "_id": null,
        "model": "qts",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "qnap",
        "version": null
      },
      {
        "_id": null,
        "model": "workcentre",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "7245"
      },
      {
        "_id": null,
        "model": "workcentre",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "7242"
      },
      {
        "_id": null,
        "model": "workcentre",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "7238"
      },
      {
        "_id": null,
        "model": "workcentre",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "7235"
      },
      {
        "_id": null,
        "model": "workcentre",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "7232"
      },
      {
        "_id": null,
        "model": "workcentre",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "7228"
      },
      {
        "_id": null,
        "model": "phaser",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "78000"
      },
      {
        "_id": null,
        "model": "phaser",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "67000"
      },
      {
        "_id": null,
        "model": "colorqube",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "9393"
      },
      {
        "_id": null,
        "model": "colorqube",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "9303"
      },
      {
        "_id": null,
        "model": "colorqube",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "9302"
      },
      {
        "_id": null,
        "model": "colorqube",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "xerox",
        "version": "9301"
      },
      {
        "_id": null,
        "model": "linux lts i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "_id": null,
        "model": "linux lts amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "_id": null,
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "_id": null,
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "_id": null,
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "_id": null,
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "_id": null,
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "_id": null,
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "11"
      },
      {
        "_id": null,
        "model": "vm virtualbox",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "3.2"
      },
      {
        "_id": null,
        "model": "vm virtualbox",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "3.1"
      },
      {
        "_id": null,
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "5"
      },
      {
        "_id": null,
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "6.2"
      },
      {
        "_id": null,
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "6"
      },
      {
        "_id": null,
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "5"
      },
      {
        "_id": null,
        "model": "email gateway patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mcafee",
        "version": "7.01"
      },
      {
        "_id": null,
        "model": "email gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mcafee",
        "version": "7.0"
      },
      {
        "_id": null,
        "model": "email gateway hotfix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mcafee",
        "version": "6.7.22"
      },
      {
        "_id": null,
        "model": "email gateway hotfix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mcafee",
        "version": "6.7.21"
      },
      {
        "_id": null,
        "model": "ds8000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "_id": null,
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "_id": null,
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "_id": null,
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3"
      },
      {
        "_id": null,
        "model": "insight control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "0"
      },
      {
        "_id": null,
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "_id": null,
        "model": "wide area application services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "_id": null,
        "model": "unified ip phone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "_id": null,
        "model": "unified contact center express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "_id": null,
        "model": "network analysis module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "_id": null,
        "model": "mds",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "_id": null,
        "model": "gss 4492r global site selector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "_id": null,
        "model": "emergency responder",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.1"
      },
      {
        "_id": null,
        "model": "digital media manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "_id": null,
        "model": "digital media manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "_id": null,
        "model": "show and share",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5(2)"
      },
      {
        "_id": null,
        "model": "ip deskphone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "96x16.2"
      },
      {
        "_id": null,
        "model": "ip deskphone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "96x16"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#252743"
      },
      {
        "db": "BID",
        "id": "70166"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-1110"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000126"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6278"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "HP",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "128764"
      },
      {
        "db": "PACKETSTORM",
        "id": "130336"
      },
      {
        "db": "PACKETSTORM",
        "id": "130988"
      },
      {
        "db": "PACKETSTORM",
        "id": "129069"
      },
      {
        "db": "PACKETSTORM",
        "id": "129070"
      },
      {
        "db": "PACKETSTORM",
        "id": "128752"
      },
      {
        "db": "PACKETSTORM",
        "id": "129438"
      },
      {
        "db": "PACKETSTORM",
        "id": "128763"
      },
      {
        "db": "PACKETSTORM",
        "id": "129095"
      },
      {
        "db": "PACKETSTORM",
        "id": "129617"
      },
      {
        "db": "PACKETSTORM",
        "id": "128760"
      }
    ],
    "trust": 1.1
  },
  "cve": "CVE-2014-6278",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-6278",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.1,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2014-000126",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2014-6278",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-6278",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2014-6278",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2014-000126",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201409-1110",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2014-6278",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2014-6278"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-1110"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000126"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6278"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6278"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277. QNAP Systems, Inc. Provided by QTS teeth, Turbo NAS for OS is. QTS for, GNU Bash Vulnerability (JVNVU#97219505) caused by OS Command injection vulnerability (CWE-78) Exists. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : University of Electro-Communications Wakisaka Yuki MrAny application permission OS The command may be executed. \nAn attacker can exploit this issue to execute arbitrary code within the  context of the affected application. Failed exploit  attempts will  result in a denial-of-service  condition. \n\nThis vulnerability allows users that have been granted access to a shell\nscript to escalate privilege and execute unrestricted commands at the same\nsecurity level as the Bash script. Customers who\nneed to upgrade the firmware of their Superdome X or HP Converged System 900\nfor SAP HANA should contact HP Technical Support to obtain the firmware or\nplan to schedule an onsite visit with an HP Services field service\nprofessional. \n\nNOTE: HP strongly recommends implementing the following security best\npractices to help reduce both known and future security vulnerability risks:\n\nIsolate the HP Superdome X or HP Converged System 900 for SAP HANA\u0027s\nmanagement network by keeping it separate from the data or production\nnetwork, and not connecting it directly to the Internet without additional\naccess authentication. \nPatch and maintain Lightweight Directory Access Protocol (LDAP) and web\nservers. \nUse virus scanners, intrusion detection/prevention systems (IDS/IPS), and\nvulnerability scanners regularly. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04558068\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04558068\nVersion: 1\n\nHPSBMU03246 rev.1 - HP Insight Control for Linux Central Management Server\nPre-boot Execution Environment running Bash Shell, Multiple Vulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-02-02\nLast Updated: 2015-02-02\n\nPotential Security Impact: Multiple vulnerabilities\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP Insight\nControl for Linux Central Management Server Pre-boot Execution Environment\nthat could be exploited remotely resulting in Denial of Service (DoS),\ndisclosure of information, and other vulnerabilities. \n\nReferences:\n\nCVE-2014-6271\nCVE-2014-6277\nCVE-2014-6278\nCVE-2014-7169\nCVE-2014-7186\nCVE-2014-7187\nCVE-2014-7196\nSSRT101742\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Insight Control for Linux Central Management Server Pre-boot Execution\nEnvironment running Bash Shell\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2014-6271    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0\nCVE-2014-6277    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0\nCVE-2014-6278    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0\nCVE-2014-7169    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0\nCVE-2014-7186    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0\nCVE-2014-7187    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0\nCVE-2014-7196    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following instructions to resolve these vulnerabilities. \n\nFollow these steps to update the HP Insight Control for Linux Central\nManagement Server Pre-boot Execution Environment:\n\nNOTE: The following procedure updates the bash shell on the Linux Pre-boot\nExecution Environment. On the Production RHEL 6.2 OS:\n\na. Prepare temporary directory for Bash update software:\n\n# mkdir -p $HOME/tmp/bash\n# cd $HOME/tmp/bash\n# pwd\n\u003chome directory\u003e/tmp/bash\n\nb. Download the file \u0027bash-4.1.2-15.el6_4.2.i686.rpm\u0027 for Insight Control for\nLinux Red Hat 6.2 i386 from https://rhn.redhat.com/errata/RHSA-2014-1311.html\nto the temporary directory \u0027$HOME/tmp/bash\u0027. \n\nc. Extract the Bash update software package. \n\n# rpm2cpio bash-4.1.2-15.el6_4.2.i686.rpm| cpio -idmv\n\nd. Verify the version of the Bash update software:\n\n# ./bin/bash --version\nGNU bash, version 4.1.2(1)-release (i686-redhat-linux-gnu)\n\ne. Verify version dependencies:\n\n# ldd ./bin/bash\n\nlinux-gate.so.1 =\u003e (0x008a7000)\nlibtinfo.so.5 =\u003e /lib/libtinfo.so.5 (0x00459000)\nlibdl.so.2 =\u003e /lib/libdl.so.2 (0x002c0000)\nlibc.so.6 =\u003e /lib/libc.so.6 (0x0012e000)\n/lib/ld-linux.so.2 (0x00108000)\n\nf. Create archive file from \u0027/lib\u0027 to copy and install on the Insight Control\nfor Linux Central Management Server Pre-boot Execution Environment system:\n\n# mkdir $HOME/tmp/lib\n# cd /lib\n# cp * $HOME/tmp/lib\n# cd $HOME/tmp\n# pwd\n\u003chome directory\u003e/tmp\n# tar cvf bash_lib.tar *\n\n2. Download the new archive file \u0027$HOME/tmp/bash_lib.tar\u0027 from the Production\nRHEL 6.2 OS system to the Insight Control for Linux Central Management Server\nPre-boot Execution Environment system. On the HP Insight Control for Linux Central Managment Server Pre-boot\nExecution Environment system:\n\na. Create a temporary folder for the toolkit and copy the toolkit there :\n\n# mkdir -p $HOME/tmp/temp-toolkit\n# cp /usr/share/systemimager/boot/i386/standard/toolkit.tar.gz\n$HOME/tmp/temp-toolkit\n\nb. Extract the file \u0027toolkit.tar.gz\u0027 into the temporary folder:\n\n# cd $HOME/tmp/temp-toolkit\n# tar zxvf toolkit.tar.gz\n# mv $HOME/tmp/temp-toolkit/toolkit.tar.gz /tmp\n\nc. Verify the version of the toolkit Bash:\n\n# $HOME/tmp/temp-toolkit/bin/bash --version\nGNU bash, version 3.2.0(1)-release (i386-pc-linux-gnu) Copyright (C) 2005\nFree Software Foundation, Inc. \n\nd. Verify dependencies versions:\n\n# ldd $HOME/tmp/temp-toolkit/bin/bash\n\nlinux-gate.so.1 =\u003e (0xffffe000)\nlibtermcap.so.2 =\u003e /lib/libtermcap.so.2 (0xf7f8c000)\nlibdl.so.2 =\u003e /lib/libdl.so.2 (0x008bf000)\nlibc.so.6 =\u003e /lib/libc.so.6 (0x00777000)\n/lib/ld-linux.so.2 (0x00755000)\n\ne. Extract the archive \u0027bash_lib.tar\u0027 to directory \u0027$HOME/tmp/bash_lib\u0027 . \nThen copy the bash binary and the library files to their respective\nlocations:\n\n# tar xvf $HOME/tmp/bash_lib\n# cp $HOME/tmp/bash_lib/bash/bash $HOME/tmp/temp-toolkit/bin\n# cp $HOME/tmp/bash_lib/lib/* $HOME/tmp/temp-toolkit/lib\n\nf. Create the updated toolkit gzipped archive file and place in\n/usr/share/systemimager/boot/i386/standard\n\n# tar czvf toolkit.tar.gz *\n# cp toolkit.tar.gz /usr/share/systemimager/boot/i386/standard\n\nHISTORY\nVersion:1 (rev.1) - 2 February 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. ============================================================================\nUbuntu Security Notice USN-2380-1\nOctober 09, 2014\n\nbash vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Bash. \n\nSoftware Description:\n- bash: GNU Bourne Again SHell\n\nDetails:\n\nMichal Zalewski discovered that Bash incorrectly handled parsing certain\nfunction definitions. If an attacker were able to create an environment\nvariable containing a function definition with a very specific name, these\nissues could possibly be used to bypass certain environment restrictions\nand execute arbitrary code. (CVE-2014-6277, CVE-2014-6278)\n\nPlease note that the previous Bash security update, USN-2364-1, includes\na hardening measure that prevents these issues from being used in a\nShellshock attack. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n  bash                            4.3-7ubuntu1.5\n\nUbuntu 12.04 LTS:\n  bash                            4.2-2ubuntu2.6\n\nUbuntu 10.04 LTS:\n  bash                            4.1-2ubuntu3.5\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n  http://www.ubuntu.com/usn/usn-2380-1\n  CVE-2014-6277, CVE-2014-6278\n\nPackage Information:\n  https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.5\n  https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.6\n  https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.5\n. \n-----BEGIN PGP SIGNED MESSAGE-----\n\nCA20141001-01: Security Notice for Bash Shellshock Vulnerability\n\n\nIssued: October 01, 2014\nUpdated: October 03, 2014\n\n\nCA Technologies is investigating multiple GNU Bash vulnerabilities, \nreferred to as the \"Shellshock\" vulnerabilities, which were publicly \ndisclosed on September 24-27, 2014. CVE identifiers CVE-2014-6271, \nCVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, and \nCVE-2014-6278 have been assigned to these vulnerabilities. \n\nThe CA Technologies Enterprise Information Security team has led a \nglobal effort to identify and remediate systems and products discovered \nwith these vulnerabilities. We continue to patch our systems as fixes \nbecome available, and we are providing fixes for affected CA \nTechnologies products. \n\nCA Technologies continues to aggressively scan our environments \n(including servers, networks, external facing applications, and SaaS \nenvironments) to proactively monitor, identify, and remediate any \nvulnerability when necessary. \n\n\nRisk Rating\n\nHigh\n\n\nPlatform\n\nAIX\nAndroid (not vulnerable, unless rooted)\nApple iOS (not vulnerable unless jailbroken)\nLinux\nMac OS X\nSolaris\nWindows (not vulnerable unless Cygwin or similar ported Linux tools \n   with Bash shell are installed)\nOther UNIX/BSD based systems if Bash is installed\nAny other OS or JeOS that utilizes Bash\n\n\nAffected Products\n\nThe following products have been identified as potentially vulnerable, \nand we have made fixes available for all of these products. \n\nCA API Management (Linux appliance only)\n\nCA Application Performance Management (TIM is the only affected APM \n   component)\n\nCA Application Performance Management Cloud Monitor\n\nCA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM)\n\nCA Layer 7 products (API Gateway, Mobile Access Gateway, API Management \n   Portal)\n\nCA User Activity Reporting Module (Enterprise Log Manager)\n\nNote: This security notice will be updated if other CA Technologies \nproducts are determined to be vulnerable. \n\nIn most cases, the Bash vulnerabilities will need to be patched by OS \nvendors. Exceptions may include CA Technologies appliances, and \nsoftware products that include Linux, UNIX or Mac OS X based operating \nsystems (that include Bash). \n\n\nAffected Components\n\nCentOS\nCygwin\nGNU Bash\nRed Hat Enterprise Linux\nSUSE Linux\n\n\nNon-Affected Products\n\nIMPORTANT NOTE: This listing includes only a small subset of the \nunaffected CA Technologies products. We\u0027re including unaffected \nproducts that customers have already inquired about. While the \nfollowing CA Technologies products are not directly affected by the \nBash vulnerabilities, the underlying operating systems that CA \nTechnologies software is installed on may be vulnerable. We strongly \nencourage our customers to follow the recommendations provided by their \nvendors for all operating systems they utilize. \n\nAll CA SaaS / On Demand products were either not vulnerable or have \nalready been patched. \n\nCA AHS / PaymentMinder - AHS App is not vulnerable. The AHS app does \nnot execute CGI scripts, or spawn or execute shell commands from within \nthe app. AHS infrastructure already patched. \n\nCA Asset Portfolio Management\n\nCA AuthMinder (Arcot WebFort)\n\nCA AuthMinder for Business Users\n\nCA AuthMinder for Consumers\n\nCA AutoSys products - We use the bash shell that comes with the \noperating system and the customer is responsible for patching their OS. \nAdditionally, the agents themselves do not distribute any scripts that \nuse bash. \n\nCA Clarity On Demand\n\nCA CloudMinder - CloudMinder does not include the Bash Shell in BoM, or \nuse it, but because we are deployed on RHEL, customers may be \nindirectly affected. Customers using RHEL should apply patches provided \nby Red Hat. \n\nCA Console Management for OpenVMS - Our OpenVMS products do not bundle \nbash, and they do not supply bash scripts; we use nothing but the \nnative DCL CLI. \n\nCA ControlMinder\n\nCA DataMinder (formerly DLP) products \u2013 Software and appliance \nconfirmed not vulnerable. Note: Linux Agents shipped, but no public SSH \nor Web apps are used in these agents. Customers should patch bash shell \non any Linux server with DataMinder agents. DataMinder agents should \ncontinue to function normally. \n\nCA Digital Payments SaaS (previously patched)\n\nCA Directory\n\nCA eCommerce SaaS / On Demand (previously patched)\n\nCA Endevor Software Change Manager\n\nCA Federation (formerly SiteMinder Federation)\n\nCA GovernanceMinder\n\nCA IdentityMinder\n\nCA Infrastructure Management\n\nCA JCLCheck\n\nCA Job Management for OpenVMS - Our OpenVMS products do not bundle \nbash, and they do not supply bash scripts; we use nothing but the \nnative DCL CLI. \n\nCA NetQoS GigaStor Observer Expert\n\nCA Network Flow Analysis\n\nCA Performance Management for OpenVMS - Our OpenVMS products do not \nbundle bash, and they do not supply bash scripts; we use nothing but \nthe native DCL CLI. \n\nCA RiskMinder\n\nCA Service Desk Manager\n\nCA Service Operations Insight (SOI)\n\nCA SiteMinder\n\nCA SOLVE:Access\n\nCA Spectrum for Linux - Not vulnerable. Be sure to apply bash fixes \nfrom your underlying operating system vendor. \n\nCA Strong Authentication\n\nCA System Watchdog for OpenVMS - Our OpenVMS products do not bundle \nbash, and they do not supply bash scripts; we use nothing but the \nnative DCL CLI. \n\nCA Top Secret\n\nCA Universal Job Management Agent for OpenVMS - Our OpenVMS products do \nnot bundle bash, and they do not supply bash scripts; we use nothing \nbut the native DCL CLI. \n\nCA Virtual Assurance for Infrastructure Managers (VAIM)\n\n\nSolution\n\nCA Technologies has issued the following fixes to address the \nvulnerabilities. \n\nCA API Management:\nPatches for Linux appliance are available through CA Support to \ncustomers of Gateway (applicable for all versions \u2013 6.1.5, 6.2, 7.0, \n7.1, 8.0, 8.1, 8.1.1, 8.1.02). \n\nCA Application Performance Management:\nKB article for APM TIM has been published. APM TIM is the only part of \nAPM that was affected. Refer to TEC618037. \n\nCA Application Performance Management Cloud Monitor:\nNew images are available for subscribers. Download the latest OPMS \nversion 8.2.1.5. For assistance, contact CA Support. \n\nCA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM):\nVery low risk. 9.6 is not affected. 9.5 Installation uses Bash. We do \nnot use Bash at all for the CEM operating system that we have shipped \nin the past. This means that customers who patch the OS will not impact \nthe ability of the CEM TIMsoft from operating. However prior to version \n9.6, the TIM installation script does use the bash shell. See new KB \narticle TEC618037 for additional information. \n\nCA Layer 7 (API Gateway, Mobile Access Gateway, API Management Portal):\nFixes for all Bash vulnerabilities and a security bulletin are available \non the Layer 7 Support website. \n\nCA User Activity Reporting Module (Enterprise Log Manager):\nAll 12.5 and 12.6 GA versions are potentially affected. Patches \nprovided on 2014-09-30. To get the patch, use the OS update \nfunctionality to get the latest R12.6 SP1 subscription update. Note \nthat you can update R12.5 SPx with the R12.6 SP1 OS update. For \nassistance, contact CA Support. \n\n\nWorkaround\n\nNone\n\nTo help mitigate the risk, we do strongly encourage all customers to \nfollow patch management best practices, and in particular for operating \nsystems affected by the Bash Shellshock vulnerabilities. \n\n\nReferences\n\nCVE-2014-6271 - Bash environment variable command injection\nCVE-2014-7169 - Bash environment variable incomplete fix for CVE-2014-6271\nCVE-2014-7186 - Bash parser redir_stack memory corruption\nCVE-2014-7187 - Bash nested flow control constructs off-by-one\nCVE-2014-6277 - Bash untrusted pointer use uninitialized memory\nCVE-2014-6278 - Bash environment variable command injection\n\nCA20141001-01: Security Notice for Bash Shellshock Vulnerability\nhttps://support.ca.com/irj/portal/anonymous/phpsbpldgpg\n\n\nChange History\n\nv1.0: 2014-10-01, Initial Release\nv1.1: 2014-10-02, Added AuthMinder, Strong Authentication, VAIM, \n      Clarity OD, All SaaS/OD products to list of Non-Affected Products. \nv1.2: 2014-10-03, Added RiskMinder to Non-Affected Products. Updated \n      UARM solution info. \n\n\nIf additional information is required, please contact CA Technologies \nSupport at https://support.ca.com. \n\nIf you discover a vulnerability in CA Technologies products, please \nreport your findings to the CA Technologies Product Vulnerability \nResponse Team at vuln@ca.com. \nPGP key:\nsupport.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782\n\nSecurity Notices\nhttps://support.ca.com/irj/portal/anonymous/phpsbpldgpg\n\n\nRegards,\nKen Williams\nDirector, Product Vulnerability Response Team\nCA Technologies | One CA Plaza | Islandia, NY 11749 | www.ca.com\nKen.Williams@ca.com | vuln@ca.com\n\n\nCopyright \u00a9 2014 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. \n11749. All other trademarks, trade names, service marks, and logos \nreferenced herein belong to their respective companies. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: Encryption Desktop 10.3.2 (Build 15238)\nCharset: utf-8\n\nwsBVAwUBVDK+PZI1FvIeMomJAQFl/Af/TqrSE/h4r3gs9PwrWKdt21PCRI3za9Lx\nM5ZyTdVDIQ9ybgPkLqsovNRPgVqd7zwDHsx0rzvF5Y82uO+vQ63BuEV2GnczAax/\nEiAW4WVxUgWG+lAowGV55Of8ruv/gOiAWTjFhkqpsyVg96ZMw2HLG62IwZL1j0qa\noLCu0y3VrGvqH0g2hi75QwHAjNCdlEsD4onUqTCc9cRTdLwFCZrUQ8KTrqIL7LK5\nUo5T9C1UeAyNTo3KiJ/zw3BCOTkpl99dmg3NW0onU/1r1CXdlyS7opLB+GJ+xGwP\nxRQdUsOIhzfRzx7bsao2D43IhDnzJBBFJHdeMPo18WBTfJ7aUgBwGQ==\n=B62b\n-----END PGP SIGNATURE-----\n. \n\n  HP Product\n   Firmware Version\n\n  HP StoreEver ESL G3 Tape Libraries with MCB version 2\n   680H_GS40701\n\n  HP StoreEver ESL G3 Tape Libraries with MCB version 1\n   656H_GS10801\n\n  The firmware is customer installable and is available in the Drivers,\nSoftware \u0026 Firmware section at the following location:\n\n    http://www.hp.com/support/eslg3\n\n  Notes:\n\n    - Updating the library firmware requires a reboot of the library. \n\n  - Disable DHCP and only use static IP addressing. No other firmware\nstream updates are planned beyond the NX-OS 5.x and 6.x versions listed below\nfor the MDS products. This software versions 6.2(9a) has included the\nfixes for the vulnerability in HP StoreFabric C-series MDS switches which\ncurrently supporting NX-OS 6.X releases. This software version 5.2(8e) has included the fix\nfor the vulnerability in HP C-series MDS switches which currently supporting\nNX-OS 5.X releases. This bulletin will be revised\nwhen these updates become available. \n\nMITIGATION INFORMATION\n\nIf updating to a NX-OS version containing the fix is not currently possible,\nHP recommends the following steps to reduce the risk of this vulnerability:\n\nThe \"ssh\" or \"telnet\" features may be disabled by the admin user. All MDS and\nNexus 5K switches can function in this configuration. Access is available\nthrough the console port. \n\nHP Vertica AMI\u0027s and Virtual Machines prior to v7.1.1-0. \n\nHP has released the following updates to resolve this vulnerability for HP\nVertica products. \n\nUpdate to the latest VM image available at: https://my.vertica.com\n\nFor customers using the AMI version HP Vertica Analytics platform, please\ninstall the latest image available at Amazon. \nUnder Step2: your ITRC operating systems\n  - verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile\nto update appropriate sections. HP is continually reviewing and enhancing the\nsecurity features of software products to provide customers with current\nsecure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the\nattention of users of the affected HP products the important security\ninformation contained in this Bulletin. HP recommends that all users\ndetermine the applicability of this information to their individual\nsituations and take appropriate action. HP does not warrant that this\ninformation is necessarily accurate or complete for all user situations and,\nconsequently, HP will not be responsible for any damages resulting from\nuser\u0027s use or disregard of the information provided in this Bulletin. To the\nextent permitted by law, HP disclaims all warranties, either express or\nimplied, including the warranties of merchantability and fitness for a\nparticular purpose, title and non-infringement.\"\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \n\n  Note: HP and the switch vendor recommend running an active version of\nFabric OS (FOS) listed on the HP Single Point of Connectivity Knowledge\n(SPOCK) website ( http://h20272.www2.hp.com/ ) and applying the work-around\ninformation provided in the MITIGATION INFORMATION section below to protect\nHP StoreFabric B-series switches from this vulnerability. \n\n  Fabric OS (FOS) v7.3.0b (This version will be available soon and this\nbulletin will revised at that time)\n\n  The following focused fix FOS versions are available for the previously\nreleased versions and have been renamed to include an additional hexadecimal\ncharacter appended to the FOS version on which it is based:\n\n    FOS v7.2.1c1\n    FOS v7.2.0d6\n    FOS v7.1.2b1\n    FOS v7.1.1c1\n    FOS v7.1.0cb\n    FOS v7.0.2e1\n    FOS v7.0.0d1\n    FOS v6.4.3f3\n    FOS v6.4.2a3\n    FOS v6.2.2f9\n\nMITIGATION INFORMATION\n\n  HP recommends the following steps to reduce the risk of this vulnerability:\n\n    - Place the HP StoreFabric SAN switch and other data center critical\ninfrastructure behind a firewall to disallow access from the Internet. \n    - Change all HP StoreFabric switch default account passwords, including\nthe root passwords, from the default factory passwords. \n    - Examine the list of accounts, including ones on the switch and those\nexisting on remote authentication servers such as RADIUS, LDAP, and TACAS+,\nto ensure only necessary personnel can gain access to HP StoreFabric FOS\nswitches. Delete guest accounts and temporary accounts created for one-time\nusage needs. \n    - Utilize FOS password policy management to strengthen the complexity,\nage, and history requirements of switch account passwords",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-6278"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000126"
      },
      {
        "db": "CERT/CC",
        "id": "VU#252743"
      },
      {
        "db": "BID",
        "id": "70166"
      },
      {
        "db": "PACKETSTORM",
        "id": "128764"
      },
      {
        "db": "PACKETSTORM",
        "id": "130336"
      },
      {
        "db": "PACKETSTORM",
        "id": "128606"
      },
      {
        "db": "PACKETSTORM",
        "id": "130988"
      },
      {
        "db": "PACKETSTORM",
        "id": "128567"
      },
      {
        "db": "PACKETSTORM",
        "id": "129069"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-6278"
      },
      {
        "db": "PACKETSTORM",
        "id": "128752"
      },
      {
        "db": "PACKETSTORM",
        "id": "129438"
      },
      {
        "db": "PACKETSTORM",
        "id": "128763"
      },
      {
        "db": "PACKETSTORM",
        "id": "129095"
      },
      {
        "db": "PACKETSTORM",
        "id": "129617"
      },
      {
        "db": "PACKETSTORM",
        "id": "128760"
      },
      {
        "db": "PACKETSTORM",
        "id": "129070"
      }
    ],
    "trust": 3.87
  },
  "exploit_availability": {
    "_id": null,
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=39568",
        "trust": 0.5,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2014-6278"
      }
    ]
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-6278",
        "trust": 4.9
      },
      {
        "db": "JVN",
        "id": "JVN55667175",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000126",
        "trust": 2.5
      },
      {
        "db": "MCAFEE",
        "id": "SB10085",
        "trust": 2.0
      },
      {
        "db": "JUNIPER",
        "id": "JSA10648",
        "trust": 2.0
      },
      {
        "db": "CERT/CC",
        "id": "VU#252743",
        "trust": 1.9
      },
      {
        "db": "PACKETSTORM",
        "id": "128567",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "61641",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61603",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61287",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "60055",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61654",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61313",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "60044",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "58200",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61550",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61780",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61552",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61565",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61312",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "60193",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61129",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61703",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "60433",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61128",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "60063",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61816",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61633",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "60034",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61643",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61485",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61503",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "62343",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "60325",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61291",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61328",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61283",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "60024",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61442",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "59961",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61471",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61857",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "61065",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "59907",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "62312",
        "trust": 1.7
      },
      {
        "db": "PACKETSTORM",
        "id": "137344",
        "trust": 1.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "39568",
        "trust": 1.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "39887",
        "trust": 1.6
      },
      {
        "db": "JVN",
        "id": "JVNVU97219505",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU97220341",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004431",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004433",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004476",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004399",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004410",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004432",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-269-01A",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-15-344-01",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-1110",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "70166",
        "trust": 0.4
      },
      {
        "db": "JUNIPER",
        "id": "JSA10661",
        "trust": 0.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-269-01",
        "trust": 0.3
      },
      {
        "db": "EXPLOITDB",
        "id": "39568",
        "trust": 0.1
      },
      {
        "db": "EXPLOITDB",
        "id": "39887",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-6278",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "128764",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "130336",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "128606",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "130988",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "129069",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "129070",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "128752",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "129438",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "128763",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "129095",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "129617",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "128760",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#252743"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-6278"
      },
      {
        "db": "BID",
        "id": "70166"
      },
      {
        "db": "PACKETSTORM",
        "id": "128764"
      },
      {
        "db": "PACKETSTORM",
        "id": "130336"
      },
      {
        "db": "PACKETSTORM",
        "id": "128606"
      },
      {
        "db": "PACKETSTORM",
        "id": "130988"
      },
      {
        "db": "PACKETSTORM",
        "id": "128567"
      },
      {
        "db": "PACKETSTORM",
        "id": "129069"
      },
      {
        "db": "PACKETSTORM",
        "id": "129070"
      },
      {
        "db": "PACKETSTORM",
        "id": "128752"
      },
      {
        "db": "PACKETSTORM",
        "id": "129438"
      },
      {
        "db": "PACKETSTORM",
        "id": "128763"
      },
      {
        "db": "PACKETSTORM",
        "id": "129095"
      },
      {
        "db": "PACKETSTORM",
        "id": "129617"
      },
      {
        "db": "PACKETSTORM",
        "id": "128760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-1110"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000126"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6278"
      }
    ]
  },
  "id": "VAR-201409-1154",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.3212341
  },
  "last_update_date": "2026-03-05T23:09:27.165000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Server/Client Products \u00a0bash Vulnerability (CVE-2014-6271,CVE-2014-7169 other ) About the impact of",
        "trust": 0.8,
        "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
      },
      {
        "title": "GNU Bash Fixes for operating system command injection vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168880"
      },
      {
        "title": "Ubuntu Security Notice: bash vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2380-1"
      },
      {
        "title": "VMware Security Advisories: VMware product updates address critical Bash security vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=86cb6b3955e100fdc9667a7ca916c772"
      },
      {
        "title": "Symantec Security Advisories: SA82 : GNU Bash Shellshock Command Injection Vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=2b57ceaadfde2a8b03482273e1fd21ea"
      },
      {
        "title": "Citrix Security Bulletins: Citrix XenServer Shellshock Security Update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=64ae0aae8269062686789e3a3fa1d2bf"
      },
      {
        "title": "Tenable Security Advisories: [R7] Tenable Appliance Affected by GNU bash \u0027Shellshock\u0027 Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2014-07"
      },
      {
        "title": "Citrix Security Bulletins: Citrix Security Advisory for GNU Bash Shellshock Vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=73443a6db89dc66fc6bcb49f85bfd1ab"
      },
      {
        "title": "CiscoUCS-Shellshock",
        "trust": 0.1,
        "url": "https://github.com/thatchriseckert/CiscoUCS-Shellshock "
      },
      {
        "title": "0day-WriteUp-TryHackme-CTF-Medium",
        "trust": 0.1,
        "url": "https://github.com/elc4br4/0day-WriteUp-TryHackme-CTF-Medium "
      },
      {
        "title": "ShellScan",
        "trust": 0.1,
        "url": "https://github.com/0xICF/ShellScan "
      },
      {
        "title": "cvesploit",
        "trust": 0.1,
        "url": "https://github.com/swapravo/cvesploit "
      },
      {
        "title": "fabric-shellshock",
        "trust": 0.1,
        "url": "https://github.com/ericlake/fabric-shellshock "
      },
      {
        "title": "w-test",
        "trust": 0.1,
        "url": "https://github.com/inspirion87/w-test "
      },
      {
        "title": "Xpl-SHELLSHOCK-Ch3ck",
        "trust": 0.1,
        "url": "https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck "
      },
      {
        "title": "bashcheck",
        "trust": 0.1,
        "url": "https://github.com/hannob/bashcheck "
      },
      {
        "title": "shellshockFixOSX",
        "trust": 0.1,
        "url": "https://github.com/opragel/shellshockFixOSX "
      },
      {
        "title": "shocktrooper",
        "trust": 0.1,
        "url": "https://github.com/EvanK/shocktrooper "
      },
      {
        "title": "ShellShockHunter",
        "trust": 0.1,
        "url": "https://github.com/MrCl0wnLab/ShellShockHunter "
      },
      {
        "title": "shellshocker-pocs",
        "trust": 0.1,
        "url": "https://github.com/mubix/shellshocker-pocs "
      },
      {
        "title": "ActiveScanPlusPlus",
        "trust": 0.1,
        "url": "https://github.com/albinowax/ActiveScanPlusPlus "
      },
      {
        "title": "afl-cve",
        "trust": 0.1,
        "url": "https://github.com/mrash/afl-cve "
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/researcher-takes-wraps-off-two-undisclosed-shellshock-vulnerabilities-in-bash/108674/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2014-6278"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-1110"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000126"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-78",
        "trust": 1.0
      },
      {
        "problemtype": "OS Command injection (CWE-78) [IPA evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000126"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6278"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.8,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash"
      },
      {
        "trust": 2.8,
        "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10085"
      },
      {
        "trust": 2.5,
        "url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html"
      },
      {
        "trust": 2.5,
        "url": "https://kb.bluecoat.com/index?page=content\u0026id=sa82"
      },
      {
        "trust": 2.5,
        "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749"
      },
      {
        "trust": 2.0,
        "url": "http://www.vmware.com/security/advisories/vmsa-2014-0010.html"
      },
      {
        "trust": 2.0,
        "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10648"
      },
      {
        "trust": 2.0,
        "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897"
      },
      {
        "trust": 2.0,
        "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246"
      },
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079"
      },
      {
        "trust": 1.8,
        "url": "http://www.ubuntu.com/usn/usn-2380-1"
      },
      {
        "trust": 1.8,
        "url": "https://www.exploit-db.com/exploits/39568/"
      },
      {
        "trust": 1.7,
        "url": "https://security-tracker.debian.org/tracker/cve-2014-6278"
      },
      {
        "trust": 1.7,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147414"
      },
      {
        "trust": 1.7,
        "url": "https://www.suse.com/support/shellshock/"
      },
      {
        "trust": 1.7,
        "url": "http://support.novell.com/security/cve/cve-2014-6278.html"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61641"
      },
      {
        "trust": 1.7,
        "url": "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61485"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/59907"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61654"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61565"
      },
      {
        "trust": 1.7,
        "url": "http://www.novell.com/support/kb/doc.php?id=7015721"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61643"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61503"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61633"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61552"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61703"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61283"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61603"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "https://support.citrix.com/article/ctx200217"
      },
      {
        "trust": 1.7,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/60034"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61816"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61128"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61313"
      },
      {
        "trust": 1.7,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61442"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61287"
      },
      {
        "trust": 1.7,
        "url": "https://support.citrix.com/article/ctx200223"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/60055"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61129"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61780"
      },
      {
        "trust": 1.7,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479"
      },
      {
        "trust": 1.7,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61471"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/58200"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61328"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61857"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/60193"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61065"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61550"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/60325"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61312"
      },
      {
        "trust": 1.7,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/60063"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61291"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/60044"
      },
      {
        "trust": 1.7,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445"
      },
      {
        "trust": 1.7,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityalerts"
      },
      {
        "trust": 1.7,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/60433"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/60024"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://jvn.jp/en/jp/jvn55667175/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000126"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/62312"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/59961"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/62343"
      },
      {
        "trust": 1.7,
        "url": "http://linux.oracle.com/errata/elsa-2014-3093"
      },
      {
        "trust": 1.7,
        "url": "http://linux.oracle.com/errata/elsa-2014-3094"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
      },
      {
        "trust": 1.7,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2015:164"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.com/files/137344/sun-secure-global-desktop-oracle-global-desktop-shellshock.html"
      },
      {
        "trust": 1.7,
        "url": "https://www.exploit-db.com/exploits/39887/"
      },
      {
        "trust": 1.7,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-c04518183"
      },
      {
        "trust": 1.7,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-c04497075"
      },
      {
        "trust": 1.7,
        "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
      },
      {
        "trust": 1.6,
        "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
      },
      {
        "trust": 1.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6277"
      },
      {
        "trust": 1.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6278"
      },
      {
        "trust": 1.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7169"
      },
      {
        "trust": 1.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6271"
      },
      {
        "trust": 1.1,
        "url": "http://www.fortiguard.com/advisory/fg-ir-14-030/"
      },
      {
        "trust": 1.1,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/"
      },
      {
        "trust": 1.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7186"
      },
      {
        "trust": 1.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7187"
      },
      {
        "trust": 1.0,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
      },
      {
        "trust": 1.0,
        "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
      },
      {
        "trust": 1.0,
        "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2014-6278"
      },
      {
        "trust": 0.8,
        "url": "http://seclists.org/oss-sec/2014/q3/650"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/articles/1200223"
      },
      {
        "trust": 0.8,
        "url": "http://seclists.org/oss-sec/2014/q3/688"
      },
      {
        "trust": 0.8,
        "url": "http://seclists.org/oss-sec/2014/q3/685"
      },
      {
        "trust": 0.8,
        "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html"
      },
      {
        "trust": 0.8,
        "url": "https://gist.github.com/anonymous/929d622f3b36b00c0be1"
      },
      {
        "trust": 0.8,
        "url": "https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html"
      },
      {
        "trust": 0.8,
        "url": "https://shellshocker.net/#"
      },
      {
        "trust": 0.8,
        "url": "http://support.apple.com/kb/ht6495"
      },
      {
        "trust": 0.8,
        "url": "https://www.barracuda.com/support/techalerts"
      },
      {
        "trust": 0.8,
        "url": "http://www.checkpoint.com/blog/protecting-shellshock/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044"
      },
      {
        "trust": 0.8,
        "url": "https://www.debian.org/security/2014/dsa-3032"
      },
      {
        "trust": 0.8,
        "url": "http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/"
      },
      {
        "trust": 0.8,
        "url": "http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml"
      },
      {
        "trust": 0.8,
        "url": "http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0"
      },
      {
        "trust": 0.8,
        "url": "http://kb.juniper.net/jsa10648"
      },
      {
        "trust": 0.8,
        "url": "http://jpn.nec.com/security-info/av14-003.html"
      },
      {
        "trust": 0.8,
        "url": "http://support.novell.com/security/cve/cve-2014-6271.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.suse.com/support/kb/doc.php?id=7015702"
      },
      {
        "trust": 0.8,
        "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.522193"
      },
      {
        "trust": 0.8,
        "url": "http://www.ubuntu.com/usn/usn-2362-1/"
      },
      {
        "trust": 0.8,
        "url": "http://kb.vmware.com/selfservice/microsites/search.do?language=en_us\u0026cmd=displaykc\u0026externalid=2090740"
      },
      {
        "trust": 0.8,
        "url": "http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/jp/jvn55667175/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu97219505/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu97220341/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004399.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004410.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004431.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004476.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004432.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004433.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7169"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6271"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6277"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6278"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7186"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7187"
      },
      {
        "trust": 0.8,
        "url": "https://www.ipa.go.jp/security/ciadr/vul/20140926-bash.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/252743"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-344-01"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a"
      },
      {
        "trust": 0.3,
        "url": "http://lcamtuf.blogspot.de/2014/09/bash-bug-apply-unofficial-patch-now.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.gnu.org/software/bash/"
      },
      {
        "trust": 0.3,
        "url": "https://lists.gnu.org/archive/html/bug-bash/2014-10/msg00040.html"
      },
      {
        "trust": 0.3,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk102673"
      },
      {
        "trust": 0.3,
        "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=kb83017"
      },
      {
        "trust": 0.3,
        "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash"
      },
      {
        "trust": 0.3,
        "url": "http://lcamtuf.blogspot.in/2014/09/quick-notes-about-bash-bug-its-impact.html"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_vulnerabilities_in_bash_affect_certain_qlogic_products_that_ibm_resells_for_bladecenter_and_flex_system_products_cve_2014_6271_c"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/archive/hw-372538.htm"
      },
      {
        "trust": 0.3,
        "url": "http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html?ref=rss"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=ssg1s1004932"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21686433"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=isg3t1021361"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21686494"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21686445"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=ssg1s1004903"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004928"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004911"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21686479"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04497075"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/fulldisclosure/2014/oct/25"
      },
      {
        "trust": 0.3,
        "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10661\u0026cat=sirt_1\u0026actp=list"
      },
      {
        "trust": 0.3,
        "url": "https://downloads.avaya.com/css/p8/documents/100183172"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/supplement-icsa-14-269-01"
      },
      {
        "trust": 0.3,
        "url": "http://www.kb.cert.org/vuls/id/bluu-9paps5"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479398"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479402"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479601"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479505"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479492"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04475942"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471532"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04488200"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04478866"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479536"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04540692"
      },
      {
        "trust": 0.3,
        "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04561445"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471546"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471538"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04497042"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04512907 "
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2015/feb/76"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04558068"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2015/feb/77"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04487558"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04487573"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04496383"
      },
      {
        "trust": 0.3,
        "url": "http://www.kb.cert.org/vuls/id/bluu-9paptm"
      },
      {
        "trust": 0.3,
        "url": "http://www.kb.cert.org/vuls/id/bluu-9paptz"
      },
      {
        "trust": 0.3,
        "url": "https://www.xerox.com/download/security/security-bulletin/1a2e5-5116a33c2fb27/cert_security_mini-_bulletin_xrx15k_for_77xx_r15-03_v1.0.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://www.xerox.com/download/security/security-bulletin/2b8d8-513128526dd97/cert_security_mini-_bulletin_xrx15m_for_wc75xx_v1_1.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://www.xerox.com/download/security/security-bulletin/2eeef-51056e459c6d8/cert_security_mini-_bulletin_xrx15h_for_p7800_v1_0.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://www.xerox.com/download/security/security-bulletin/2a20e-5105457a515cc/cert_security_mini-_bulletin_xrx15e_for_wc57xx_v1_0.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://www.xerox.com/download/security/security-bulletin/2a901-510567b876a35/cert_security_mini-_bulletin_xrx15g_for_p6700_v1_0.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://www.xerox.com/download/security/security-bulletin/29a7e-50e49f9c009f9/cert_security_mini_bulletin_xrx14g_for_77xx_v1.1.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://www.xerox.com/download/security/security-bulletin/1a7a1-50f12e334b734/cert_security_mini-_bulletin_xrx14h_for_wc59xx_v1.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://www.xerox.com/download/security/security-bulletin/2df3c-51055b159fd50/cert_security_mini_bulletin_xrx15f_for_connectkey_1.5_v1-01.pdf"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-377648.htm"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004982"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004879"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685873"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686132"
      },
      {
        "trust": 0.3,
        "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096533"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686024"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686037"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21685733"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686171"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686098"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685875"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020272"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21685541"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004905"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685673"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21685837"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687971"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685691"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004933"
      },
      {
        "trust": 0.3,
        "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096503"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004945"
      },
      {
        "trust": 0.3,
        "url": "https://downloads.avaya.com/css/p8/documents/100183088"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2104-6277"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2104-6278"
      },
      {
        "trust": 0.2,
        "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/78.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/70166"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=35880"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/2380-1/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0224"
      },
      {
        "trust": 0.1,
        "url": "https://rhn.redhat.com/errata/rhsa-2014-1311.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7196"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.6"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.5"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.5"
      },
      {
        "trust": 0.1,
        "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse"
      },
      {
        "trust": 0.1,
        "url": "https://www.ca.com"
      },
      {
        "trust": 0.1,
        "url": "https://support.ca.com/irj/portal/anonymous/phpsbpldgpg"
      },
      {
        "trust": 0.1,
        "url": "https://support.ca.com."
      },
      {
        "trust": 0.1,
        "url": "http://www.hp.com/support/eslg3"
      },
      {
        "trust": 0.1,
        "url": "http://support.openview.hp.com/selfsolve/document/km01194258"
      },
      {
        "trust": 0.1,
        "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng"
      },
      {
        "trust": 0.1,
        "url": "http://www.itrc.hp.com/service/cki/secbullarchive.do"
      },
      {
        "trust": 0.1,
        "url": "https://my.vertica.com"
      },
      {
        "trust": 0.1,
        "url": "http://h30046.www3.hp.com/subsignin.php"
      },
      {
        "trust": 0.1,
        "url": "http://h20272.www2.hp.com/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#252743"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-6278"
      },
      {
        "db": "BID",
        "id": "70166"
      },
      {
        "db": "PACKETSTORM",
        "id": "128764"
      },
      {
        "db": "PACKETSTORM",
        "id": "130336"
      },
      {
        "db": "PACKETSTORM",
        "id": "128606"
      },
      {
        "db": "PACKETSTORM",
        "id": "130988"
      },
      {
        "db": "PACKETSTORM",
        "id": "128567"
      },
      {
        "db": "PACKETSTORM",
        "id": "129069"
      },
      {
        "db": "PACKETSTORM",
        "id": "129070"
      },
      {
        "db": "PACKETSTORM",
        "id": "128752"
      },
      {
        "db": "PACKETSTORM",
        "id": "129438"
      },
      {
        "db": "PACKETSTORM",
        "id": "128763"
      },
      {
        "db": "PACKETSTORM",
        "id": "129095"
      },
      {
        "db": "PACKETSTORM",
        "id": "129617"
      },
      {
        "db": "PACKETSTORM",
        "id": "128760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-1110"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000126"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6278"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#252743",
        "ident": null
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-6278",
        "ident": null
      },
      {
        "db": "BID",
        "id": "70166",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "128764",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "130336",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "128606",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "130988",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "128567",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "129069",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "129070",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "128752",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "129438",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "128763",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "129095",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "129617",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "128760",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-1110",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000126",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6278",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2014-09-25T00:00:00",
        "db": "CERT/CC",
        "id": "VU#252743",
        "ident": null
      },
      {
        "date": "2014-09-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2014-6278",
        "ident": null
      },
      {
        "date": "2014-09-27T00:00:00",
        "db": "BID",
        "id": "70166",
        "ident": null
      },
      {
        "date": "2014-10-20T17:57:00",
        "db": "PACKETSTORM",
        "id": "128764",
        "ident": null
      },
      {
        "date": "2015-02-10T17:43:27",
        "db": "PACKETSTORM",
        "id": "130336",
        "ident": null
      },
      {
        "date": "2014-10-09T23:44:16",
        "db": "PACKETSTORM",
        "id": "128606",
        "ident": null
      },
      {
        "date": "2015-03-24T17:07:02",
        "db": "PACKETSTORM",
        "id": "130988",
        "ident": null
      },
      {
        "date": "2014-10-06T16:47:01",
        "db": "PACKETSTORM",
        "id": "128567",
        "ident": null
      },
      {
        "date": "2014-11-12T18:13:47",
        "db": "PACKETSTORM",
        "id": "129069",
        "ident": null
      },
      {
        "date": "2014-11-12T18:13:53",
        "db": "PACKETSTORM",
        "id": "129070",
        "ident": null
      },
      {
        "date": "2014-10-20T13:14:00",
        "db": "PACKETSTORM",
        "id": "128752",
        "ident": null
      },
      {
        "date": "2014-12-09T23:15:30",
        "db": "PACKETSTORM",
        "id": "129438",
        "ident": null
      },
      {
        "date": "2014-10-20T17:55:00",
        "db": "PACKETSTORM",
        "id": "128763",
        "ident": null
      },
      {
        "date": "2014-11-13T17:15:31",
        "db": "PACKETSTORM",
        "id": "129095",
        "ident": null
      },
      {
        "date": "2014-12-17T18:27:35",
        "db": "PACKETSTORM",
        "id": "129617",
        "ident": null
      },
      {
        "date": "2014-10-20T17:03:00",
        "db": "PACKETSTORM",
        "id": "128760",
        "ident": null
      },
      {
        "date": "2014-09-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201409-1110",
        "ident": null
      },
      {
        "date": "2014-10-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-000126",
        "ident": null
      },
      {
        "date": "2014-09-30T10:55:04.723000",
        "db": "NVD",
        "id": "CVE-2014-6278",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2015-04-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#252743",
        "ident": null
      },
      {
        "date": "2021-11-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2014-6278",
        "ident": null
      },
      {
        "date": "2016-07-05T21:53:00",
        "db": "BID",
        "id": "70166",
        "ident": null
      },
      {
        "date": "2021-11-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201409-1110",
        "ident": null
      },
      {
        "date": "2024-07-18T02:27:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-000126",
        "ident": null
      },
      {
        "date": "2025-10-22T01:16:02.357000",
        "db": "NVD",
        "id": "CVE-2014-6278",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-1110"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "GNU Bash shell executes commands in exported functions in environment variables",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#252743"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "operating system commend injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-1110"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…