Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-7186

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-28 Sep, 2014 | 19:00
Updated At-06 Aug, 2024 | 12:40
Rejected At-
Credits

The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:28 Sep, 2014 | 19:00
Updated At:06 Aug, 2024 | 12:40
Rejected At:
▼CVE Numbering Authority (CNA)

The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
x_refsource_MISC
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141577137423233&w=2
vendor-advisory
x_refsource_HP
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141383138121313&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
http://www.securityfocus.com/archive/1/533593/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html
vendor-advisory
x_refsource_SUSE
http://www-01.ibm.com/support/docview.wss?uid=swg21686084
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
x_refsource_CONFIRM
http://secunia.com/advisories/61188
third-party-advisory
x_refsource_SECUNIA
http://jvn.jp/en/jp/JVN55667175/index.html
third-party-advisory
x_refsource_JVN
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/60433
third-party-advisory
x_refsource_SECUNIA
http://openwall.com/lists/oss-security/2014/09/25/32
mailing-list
x_refsource_MLIST
http://marc.info/?l=bugtraq&m=141383026420882&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141585637922673&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141576728022234&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21685541
x_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
x_refsource_CONFIRM
http://secunia.com/advisories/61636
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61816
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61442
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142358078406056&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61283
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142113462216480&w=2
vendor-advisory
x_refsource_HP
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
vendor-advisory
x_refsource_APPLE
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
x_refsource_CONFIRM
http://secunia.com/advisories/61654
third-party-advisory
x_refsource_SECUNIA
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
x_refsource_CONFIRM
http://secunia.com/advisories/62312
third-party-advisory
x_refsource_SECUNIA
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2014-1312.html
vendor-advisory
x_refsource_REDHAT
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61703
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-2364-1
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/61065
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383196021590&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141383081521087&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
third-party-advisory
x_refsource_JVNDB
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61641
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html
vendor-advisory
x_refsource_SUSE
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2014/Oct/0
mailing-list
x_refsource_FULLDISC
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
vendor-advisory
x_refsource_MANDRIVA
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
x_refsource_CONFIRM
https://support.apple.com/HT205267
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/60024
third-party-advisory
x_refsource_SECUNIA
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
x_refsource_MISC
http://secunia.com/advisories/61622
third-party-advisory
x_refsource_SECUNIA
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
vendor-advisory
x_refsource_CISCO
http://support.novell.com/security/cve/CVE-2014-7186.html
x_refsource_CONFIRM
http://openwall.com/lists/oss-security/2014/09/28/10
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/62343
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61565
third-party-advisory
x_refsource_SECUNIA
https://www.suse.com/support/shellshock/
x_refsource_CONFIRM
http://support.apple.com/HT204244
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141450491804793&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61313
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61873
third-party-advisory
x_refsource_SECUNIA
http://openwall.com/lists/oss-security/2014/09/26/2
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/61485
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/61618
third-party-advisory
x_refsource_SECUNIA
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141577297623641&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141383244821813&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61312
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60193
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
x_refsource_CONFIRM
http://secunia.com/advisories/61479
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60063
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60034
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59907
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/58200
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141577241923505&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61643
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/support/kb/doc.php?id=7015721
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
x_refsource_CONFIRM
http://secunia.com/advisories/61503
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2014-1354.html
vendor-advisory
x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
x_refsource_CONFIRM
http://www.qnap.com/i/en/support/con_show.php?cid=61
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141694386919794&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61552
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61780
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
x_refsource_CONFIRM
https://support.citrix.com/article/CTX200223
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21686447
x_refsource_CONFIRM
http://secunia.com/advisories/62228
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141330468527613&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/60044
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61291
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141345648114150&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61287
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61711
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142113462216480&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
vendor-advisory
x_refsource_APPLE
http://marc.info/?l=bugtraq&m=141383304022067&w=2
vendor-advisory
x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2014-1311.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/61128
third-party-advisory
x_refsource_SECUNIA
https://support.citrix.com/article/CTX200217
x_refsource_CONFIRM
http://secunia.com/advisories/61471
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60055
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61550
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61633
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
x_refsource_CONFIRM
https://kb.bluecoat.com/index?page=content&id=SA82
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/61328
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
x_refsource_CONFIRM
http://secunia.com/advisories/61129
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61603
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
x_refsource_CONFIRM
Hyperlink: http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
Resource:
x_refsource_MISC
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141383138121313&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securityfocus.com/archive/1/533593/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686084
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61188
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Resource:
third-party-advisory
x_refsource_JVN
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/60433
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://openwall.com/lists/oss-security/2014/09/25/32
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61636
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61816
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61442
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61283
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142113462216480&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61654
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/62312
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1312.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61703
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/USN-2364-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/61065
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Resource:
x_refsource_CONFIRM
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Resource:
third-party-advisory
x_refsource_JVNDB
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61641
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Resource:
x_refsource_CONFIRM
Hyperlink: http://seclists.org/fulldisclosure/2014/Oct/0
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.apple.com/HT205267
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/60024
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/61622
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://support.novell.com/security/cve/CVE-2014-7186.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://openwall.com/lists/oss-security/2014/09/28/10
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/62343
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61565
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.suse.com/support/shellshock/
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.apple.com/HT204244
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61313
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61873
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://openwall.com/lists/oss-security/2014/09/26/2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/61485
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/61618
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61312
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60193
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61479
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60063
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60034
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59907
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/58200
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61643
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61503
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Resource:
x_refsource_CONFIRM
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1354.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141694386919794&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61552
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61780
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.citrix.com/article/CTX200223
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686447
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/62228
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/60044
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61291
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61287
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61711
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142113462216480&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1311.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/61128
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.citrix.com/article/CTX200217
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61471
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60055
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61550
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61633
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Resource:
x_refsource_CONFIRM
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/61328
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61129
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61603
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
x_refsource_MISC
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141577137423233&w=2
vendor-advisory
x_refsource_HP
x_transferred
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141383138121313&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.securityfocus.com/archive/1/533593/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686084
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61188
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://jvn.jp/en/jp/JVN55667175/index.html
third-party-advisory
x_refsource_JVN
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/60433
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://openwall.com/lists/oss-security/2014/09/25/32
mailing-list
x_refsource_MLIST
x_transferred
http://marc.info/?l=bugtraq&m=141383026420882&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141585637922673&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141576728022234&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685541
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61636
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61816
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61442
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142358078406056&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61283
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142113462216480&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
vendor-advisory
x_refsource_APPLE
x_transferred
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61654
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/62312
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://rhn.redhat.com/errata/RHSA-2014-1312.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61703
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/USN-2364-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/61065
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141383196021590&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141383081521087&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
x_refsource_CONFIRM
x_transferred
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
third-party-advisory
x_refsource_JVNDB
x_transferred
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61641
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
x_refsource_CONFIRM
x_transferred
http://seclists.org/fulldisclosure/2014/Oct/0
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
x_refsource_CONFIRM
x_transferred
https://support.apple.com/HT205267
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/60024
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
x_refsource_MISC
x_transferred
http://secunia.com/advisories/61622
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
vendor-advisory
x_refsource_CISCO
x_transferred
http://support.novell.com/security/cve/CVE-2014-7186.html
x_refsource_CONFIRM
x_transferred
http://openwall.com/lists/oss-security/2014/09/28/10
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/62343
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61565
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.suse.com/support/shellshock/
x_refsource_CONFIRM
x_transferred
http://support.apple.com/HT204244
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141450491804793&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61313
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61873
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://openwall.com/lists/oss-security/2014/09/26/2
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/61485
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/61618
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141577297623641&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141383244821813&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61312
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60193
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61479
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60063
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60034
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59907
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/58200
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141577241923505&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61643
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/support/kb/doc.php?id=7015721
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61503
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
x_refsource_CONFIRM
x_transferred
http://rhn.redhat.com/errata/RHSA-2014-1354.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
x_refsource_CONFIRM
x_transferred
http://www.qnap.com/i/en/support/con_show.php?cid=61
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141694386919794&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61552
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61780
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
x_refsource_CONFIRM
x_transferred
https://support.citrix.com/article/CTX200223
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686447
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/62228
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141330468527613&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/60044
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61291
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141345648114150&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61287
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61711
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142113462216480&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://marc.info/?l=bugtraq&m=141383304022067&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://rhn.redhat.com/errata/RHSA-2014-1311.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/61128
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.citrix.com/article/CTX200217
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61471
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60055
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61550
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61633
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
x_refsource_CONFIRM
x_transferred
https://kb.bluecoat.com/index?page=content&id=SA82
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/61328
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61129
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61603
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
x_refsource_CONFIRM
x_transferred
Hyperlink: http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383138121313&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/533593/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686084
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61188
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Resource:
third-party-advisory
x_refsource_JVN
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/60433
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://openwall.com/lists/oss-security/2014/09/25/32
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61636
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61816
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61442
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61283
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142113462216480&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61654
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/62312
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1312.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61703
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-2364-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/61065
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Resource:
third-party-advisory
x_refsource_JVNDB
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61641
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2014/Oct/0
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.apple.com/HT205267
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/60024
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/61622
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://support.novell.com/security/cve/CVE-2014-7186.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://openwall.com/lists/oss-security/2014/09/28/10
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/62343
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61565
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.suse.com/support/shellshock/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.apple.com/HT204244
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61313
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61873
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://openwall.com/lists/oss-security/2014/09/26/2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/61485
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/61618
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61312
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60193
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61479
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60063
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60034
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59907
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/58200
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61643
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61503
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1354.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141694386919794&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61552
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61780
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.citrix.com/article/CTX200223
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686447
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/62228
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/60044
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61291
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61287
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61711
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142113462216480&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1311.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/61128
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.citrix.com/article/CTX200217
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61471
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60055
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61550
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61633
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/61328
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61129
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61603
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:28 Sep, 2014 | 19:55
Updated At:12 Apr, 2025 | 10:46

The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

GNU
gnu
>>bash>>1.14.0
cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.1
cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.2
cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.3
cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.4
cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.5
cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.6
cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.7
cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.0
cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.01
cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.01.1
cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.02
cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.02.1
cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.03
cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.04
cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*
GNU
gnu
>>bash>>3.0
cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.0.16
cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.1
cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.2
cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.2.48
cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.0
cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.0
cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*
GNU
gnu
>>bash>>4.1
cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.2
cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.3
cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://jvn.jp/en/jp/JVN55667175/index.htmlcve@mitre.org
N/A
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126cve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlcve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.htmlcve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141330468527613&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141345648114150&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141383026420882&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141383081521087&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141383138121313&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141383196021590&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141383244821813&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141383304022067&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141450491804793&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141576728022234&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141577137423233&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141577241923505&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141577297623641&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141585637922673&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141694386919794&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142113462216480&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142113462216480&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142358078406056&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2cve@mitre.org
N/A
http://openwall.com/lists/oss-security/2014/09/25/32cve@mitre.org
Exploit
http://openwall.com/lists/oss-security/2014/09/26/2cve@mitre.org
N/A
http://openwall.com/lists/oss-security/2014/09/28/10cve@mitre.org
N/A
http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.htmlcve@mitre.org
N/A
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.htmlcve@mitre.org
N/A
http://rhn.redhat.com/errata/RHSA-2014-1311.htmlcve@mitre.org
N/A
http://rhn.redhat.com/errata/RHSA-2014-1312.htmlcve@mitre.org
N/A
http://rhn.redhat.com/errata/RHSA-2014-1354.htmlcve@mitre.org
N/A
http://seclists.org/fulldisclosure/2014/Oct/0cve@mitre.org
N/A
http://secunia.com/advisories/58200cve@mitre.org
N/A
http://secunia.com/advisories/59907cve@mitre.org
N/A
http://secunia.com/advisories/60024cve@mitre.org
N/A
http://secunia.com/advisories/60034cve@mitre.org
N/A
http://secunia.com/advisories/60044cve@mitre.org
N/A
http://secunia.com/advisories/60055cve@mitre.org
N/A
http://secunia.com/advisories/60063cve@mitre.org
N/A
http://secunia.com/advisories/60193cve@mitre.org
N/A
http://secunia.com/advisories/60433cve@mitre.org
N/A
http://secunia.com/advisories/61065cve@mitre.org
N/A
http://secunia.com/advisories/61128cve@mitre.org
N/A
http://secunia.com/advisories/61129cve@mitre.org
N/A
http://secunia.com/advisories/61188cve@mitre.org
N/A
http://secunia.com/advisories/61283cve@mitre.org
N/A
http://secunia.com/advisories/61287cve@mitre.org
N/A
http://secunia.com/advisories/61291cve@mitre.org
N/A
http://secunia.com/advisories/61312cve@mitre.org
N/A
http://secunia.com/advisories/61313cve@mitre.org
N/A
http://secunia.com/advisories/61328cve@mitre.org
N/A
http://secunia.com/advisories/61442cve@mitre.org
N/A
http://secunia.com/advisories/61471cve@mitre.org
N/A
http://secunia.com/advisories/61479cve@mitre.org
N/A
http://secunia.com/advisories/61485cve@mitre.org
N/A
http://secunia.com/advisories/61503cve@mitre.org
N/A
http://secunia.com/advisories/61550cve@mitre.org
N/A
http://secunia.com/advisories/61552cve@mitre.org
N/A
http://secunia.com/advisories/61565cve@mitre.org
N/A
http://secunia.com/advisories/61603cve@mitre.org
N/A
http://secunia.com/advisories/61618cve@mitre.org
N/A
http://secunia.com/advisories/61622cve@mitre.org
N/A
http://secunia.com/advisories/61633cve@mitre.org
N/A
http://secunia.com/advisories/61636cve@mitre.org
N/A
http://secunia.com/advisories/61641cve@mitre.org
N/A
http://secunia.com/advisories/61643cve@mitre.org
N/A
http://secunia.com/advisories/61654cve@mitre.org
N/A
http://secunia.com/advisories/61703cve@mitre.org
N/A
http://secunia.com/advisories/61711cve@mitre.org
N/A
http://secunia.com/advisories/61780cve@mitre.org
N/A
http://secunia.com/advisories/61816cve@mitre.org
N/A
http://secunia.com/advisories/61873cve@mitre.org
N/A
http://secunia.com/advisories/62228cve@mitre.org
N/A
http://secunia.com/advisories/62312cve@mitre.org
N/A
http://secunia.com/advisories/62343cve@mitre.org
N/A
http://support.apple.com/HT204244cve@mitre.org
N/A
http://support.novell.com/security/cve/CVE-2014-7186.htmlcve@mitre.org
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bashcve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685541cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685604cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685733cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685749cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685914cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686084cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686131cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686246cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686445cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686447cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686479cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686494cve@mitre.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21687079cve@mitre.org
N/A
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164cve@mitre.org
N/A
http://www.novell.com/support/kb/doc.php?id=7015721cve@mitre.org
N/A
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.htmlcve@mitre.org
N/A
http://www.qnap.com/i/en/support/con_show.php?cid=61cve@mitre.org
N/A
http://www.securityfocus.com/archive/1/533593/100/0/threadedcve@mitre.org
N/A
http://www.ubuntu.com/usn/USN-2364-1cve@mitre.org
N/A
http://www.vmware.com/security/advisories/VMSA-2014-0010.htmlcve@mitre.org
N/A
https://kb.bluecoat.com/index?page=content&id=SA82cve@mitre.org
N/A
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648cve@mitre.org
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10085cve@mitre.org
N/A
https://support.apple.com/HT205267cve@mitre.org
N/A
https://support.citrix.com/article/CTX200217cve@mitre.org
N/A
https://support.citrix.com/article/CTX200223cve@mitre.org
N/A
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.htmlcve@mitre.org
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075cve@mitre.org
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183cve@mitre.org
N/A
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlertscve@mitre.org
N/A
https://www.suse.com/support/shellshock/cve@mitre.org
N/A
http://jvn.jp/en/jp/JVN55667175/index.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141330468527613&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141345648114150&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383026420882&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383081521087&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383138121313&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383196021590&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383244821813&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383304022067&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141450491804793&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141576728022234&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577137423233&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577241923505&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577297623641&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141585637922673&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141694386919794&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142113462216480&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142113462216480&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358078406056&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://openwall.com/lists/oss-security/2014/09/25/32af854a3a-2127-422b-91ae-364da2661108
Exploit
http://openwall.com/lists/oss-security/2014/09/26/2af854a3a-2127-422b-91ae-364da2661108
N/A
http://openwall.com/lists/oss-security/2014/09/28/10af854a3a-2127-422b-91ae-364da2661108
N/A
http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2014-1311.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2014-1312.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2014-1354.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://seclists.org/fulldisclosure/2014/Oct/0af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/58200af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59907af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60024af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60034af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60044af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60055af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60063af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60193af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60433af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61065af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61128af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61129af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61188af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61283af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61287af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61291af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61312af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61313af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61328af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61442af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61471af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61479af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61485af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61503af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61550af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61552af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61565af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61603af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61618af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61622af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61633af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61636af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61641af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61643af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61654af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61703af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61711af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61780af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61816af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61873af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/62228af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/62312af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/62343af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.apple.com/HT204244af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.novell.com/security/cve/CVE-2014-7186.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bashaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685541af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685604af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685733af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685749af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685914af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686084af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686131af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686246af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686445af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686447af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686479af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686494af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21687079af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/support/kb/doc.php?id=7015721af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.qnap.com/i/en/support/con_show.php?cid=61af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/533593/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-2364-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/security/advisories/VMSA-2014-0010.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://kb.bluecoat.com/index?page=content&id=SA82af854a3a-2127-422b-91ae-364da2661108
N/A
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648af854a3a-2127-422b-91ae-364da2661108
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10085af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.apple.com/HT205267af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.citrix.com/article/CTX200217af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.citrix.com/article/CTX200223af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183af854a3a-2127-422b-91ae-364da2661108
N/A
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlertsaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.suse.com/support/shellshock/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383138121313&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141694386919794&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142113462216480&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142113462216480&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://openwall.com/lists/oss-security/2014/09/25/32
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://openwall.com/lists/oss-security/2014/09/26/2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://openwall.com/lists/oss-security/2014/09/28/10
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1311.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1312.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1354.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://seclists.org/fulldisclosure/2014/Oct/0
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/58200
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/59907
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60024
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60034
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60044
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60055
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60063
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60193
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60433
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61065
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61128
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61129
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61188
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61283
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61287
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61291
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61312
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61313
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61328
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61442
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61471
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61479
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61485
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61503
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61550
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61552
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61565
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61603
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61618
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61622
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61633
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61636
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61641
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61643
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61654
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61703
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61711
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61780
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61816
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61873
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/62228
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/62312
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/62343
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.apple.com/HT204244
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.novell.com/security/cve/CVE-2014-7186.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686084
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686447
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/533593/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2364-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://support.apple.com/HT205267
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200217
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200223
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.suse.com/support/shellshock/
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383138121313&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141694386919794&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142113462216480&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142113462216480&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://openwall.com/lists/oss-security/2014/09/25/32
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://openwall.com/lists/oss-security/2014/09/26/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://openwall.com/lists/oss-security/2014/09/28/10
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1311.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1312.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1354.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://seclists.org/fulldisclosure/2014/Oct/0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/58200
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59907
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60024
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60034
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60044
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60055
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60063
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60193
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60433
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61065
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61128
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61129
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61188
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61283
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61287
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61291
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61312
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61313
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61328
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61442
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61471
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61479
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61485
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61503
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61550
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61552
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61565
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61603
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61618
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61622
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61633
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61636
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61641
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61643
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61654
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61703
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61711
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61780
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61816
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61873
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/62228
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/62312
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/62343
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.apple.com/HT204244
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.novell.com/security/cve/CVE-2014-7186.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686084
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686447
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/533593/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2364-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.apple.com/HT205267
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200217
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200223
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.suse.com/support/shellshock/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1793Records found

CVE-2014-9488
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-2.33% / 84.18%
||
7 Day CHG~0.00%
Published-14 Apr, 2015 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.

Action-Not Available
Vendor-n/aGNUopenSUSE
Product-lessopensusen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2014-7187
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-90.10% / 99.56%
||
7 Day CHG~0.00%
Published-28 Sep, 2014 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.

Action-Not Available
Vendor-n/aGNU
Product-bashn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2007-6109
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-3.13% / 86.32%
||
7 Day CHG~0.00%
Published-07 Dec, 2007 | 11:00
Updated-07 Aug, 2024 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain "emacs -batch -eval" command line.

Action-Not Available
Vendor-n/aGNU
Product-emacsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-2806
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-12.33% / 93.61%
||
7 Day CHG~0.00%
Published-10 Apr, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.

Action-Not Available
Vendor-n/aGNUFedora ProjectDebian GNU/LinuxCanonical Ltd.
Product-debian_linuxfedoralibtasn1ubuntu_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2000-0803
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-0.84% / 73.72%
||
7 Day CHG~0.00%
Published-07 May, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU Groff uses the current working directory to find a device description file, which allows a local user to gain additional privileges by including a malicious postpro directive in the description file, which is executed when another user runs groff.

Action-Not Available
Vendor-n/aGNU
Product-groffn/a
CVE-2006-6235
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-8.90% / 92.20%
||
7 Day CHG~0.00%
Published-07 Dec, 2006 | 11:00
Updated-07 Aug, 2024 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.

Action-Not Available
Vendor-rpathgpg4winn/aGNUSlackwareUbuntuRed Hat, Inc.
Product-linux_advanced_workstationubuntu_linuxprivacy_guardgpg4winslackware_linuxenterprise_linuxlinuxfedora_coreenterprise_linux_desktopn/a
CVE-2005-2541
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-3.25% / 86.61%
||
7 Day CHG~0.00%
Published-10 Aug, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.

Action-Not Available
Vendor-n/aGNU
Product-tarn/a
CVE-2021-3466
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.42% / 61.04%
||
7 Day CHG~0.00%
Published-25 Mar, 2021 | 00:00
Updated-03 Aug, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable.

Action-Not Available
Vendor-n/aRed Hat, Inc.GNUFedora Project
Product-enterprise_linuxfedoralibmicrohttpdlibmicrohttpd
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2004-0353
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-4.04% / 88.04%
||
7 Day CHG~0.00%
Published-18 Mar, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in auth_ident() function in auth.c for GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to gain privileges via a long string.

Action-Not Available
Vendor-n/aGNU
Product-anubisn/a
CVE-2004-1170
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-15.59% / 94.42%
||
7 Day CHG~0.00%
Published-10 Dec, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

a2ps 4.13 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename.

Action-Not Available
Vendor-n/aGNUSUSESun Microsystems (Oracle Corporation)
Product-a2pssuse_linuxjava_desktop_systemn/a
CVE-2004-0623
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-3.45% / 87.05%
||
7 Day CHG~0.00%
Published-30 Jun, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in misc.c in GNU GNATS 4.00 may allow remote attackers to execute arbitrary code via format string specifiers in a string that gets logged by syslog.

Action-Not Available
Vendor-n/aGNU
Product-gnatsn/a
CVE-2004-0603
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-2.50% / 84.74%
||
7 Day CHG~0.00%
Published-30 Jun, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332.

Action-Not Available
Vendor-n/aGNU
Product-gzipn/a
CVE-2003-0972
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-1.21% / 78.14%
||
7 Day CHG~0.00%
Published-02 Dec, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer signedness error in ansi.c for GNU screen 4.0.1 and earlier, and 3.9.15 and earlier, allows local users to execute arbitrary code via a large number of ";" (semicolon) characters in escape sequences, which leads to a buffer overflow.

Action-Not Available
Vendor-n/aGNU
Product-screenn/a
CVE-2001-0191
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-1.19% / 77.94%
||
7 Day CHG~0.00%
Published-07 May, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gnuserv before 3.12, as shipped with XEmacs, does not properly check the specified length of an X Windows MIT-MAGIC-COOKIE cookie, which allows remote attackers to execute arbitrary commands via a buffer overflow, or brute force authentication by using a short cookie length.

Action-Not Available
Vendor-andynormann/aGNU
Product-gnuservxemacsn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2000-0947
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-0.92% / 75.03%
||
7 Day CHG~0.00%
Published-22 Jan, 2001 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in cfd daemon in GNU CFEngine before 1.6.0a11 allows attackers to execute arbitrary commands via format characters in the CAUTH command.

Action-Not Available
Vendor-n/aGNU
Product-cfenginen/a
CVE-2004-1701
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-56.76% / 98.04%
||
7 Day CHG~0.00%
Published-21 Feb, 2005 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication.

Action-Not Available
Vendor-n/aGNU
Product-cfenginen/a
CVE-2006-4181
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-22.64% / 95.64%
||
7 Day CHG~0.00%
Published-28 Nov, 2006 | 02:00
Updated-07 Aug, 2024 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in the sqllog function in the SQL accounting code for radiusd in GNU Radius 1.2 and 1.3 allows remote attackers to execute arbitrary code via unknown vectors.

Action-Not Available
Vendor-n/aGNU
Product-radiusn/a
CVE-2004-0354
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-6.24% / 90.52%
||
7 Day CHG~0.00%
Published-18 Mar, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple format string vulnerabilities in GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to execute arbitrary code via format string specifiers in strings passed to (1) the info function in log.c, (2) the anubis_error function in errs.c, or (3) the ssl_error function in ssl.c.

Action-Not Available
Vendor-n/aGNU
Product-anubisn/a
CVE-2015-0235
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-10||HIGH
EPSS-85.84% / 99.34%
||
7 Day CHG~0.00%
Published-28 Jan, 2015 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

Action-Not Available
Vendor-n/aGNURed Hat, Inc.The PHP GroupApple Inc.IBM CorporationDebian GNU/LinuxOracle Corporation
Product-communications_eagle_lnp_application_processorcommunications_session_border_controllercommunications_webrtc_session_controllerphpdebian_linuxlinuxvirtualizationcommunications_eagle_application_processorexalogic_infrastructurecommunications_lsmscommunications_application_session_controllervm_virtualboxpureapplication_systemsecurity_access_manager_for_enterprise_single_sign-oncommunications_policy_managementglibcmac_os_xcommunications_user_data_repositoryn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2003-0255
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-5.43% / 89.78%
||
7 Day CHG~0.00%
Published-07 May, 2003 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path.

Action-Not Available
Vendor-n/aGNU
Product-privacy_guardn/a
CVE-2014-7169
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-90.11% / 99.57%
||
7 Day CHG+1.59%
Published-25 Sep, 2014 | 01:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-07-28||Apply updates per vendor instructions.

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

Action-Not Available
Vendor-mageian/aIBM CorporationVMware (Broadcom Inc.)F5, Inc.Oracle CorporationNovellCitrix (Cloud Software Group, Inc.)SUSEApple Inc.Red Hat, Inc.openSUSEDebian GNU/LinuxArista Networks, Inc.Check Point Software Technologies Ltd.GNUQNAP Systems, Inc.Canonical Ltd.
Product-san_volume_controller_firmwaresmartcloud_entry_appliancesmartcloud_provisioningenterprise_managerbig-ip_local_traffic_managerarxenterprise_linux_for_power_big_endianstorwize_v5000_firmwareenterprise_linux_server_ausbig-ip_edge_gatewayzenworks_configuration_managementarx_firmwarebig-ip_application_acceleration_managerbig-ip_application_security_managerbig-ip_global_traffic_managerbig-ip_webacceleratorstorwize_v3500_firmwareenterprise_linuxenterprise_linux_serversecurity_access_manager_for_web_7.0_firmwarebig-ip_analyticsqtsstn6500virtualizationsan_volume_controllerenterprise_linux_for_ibm_z_systemsstudio_onsiteubuntu_linuxesxstorwize_v3700_firmwarestn6800_firmwareenterprise_linux_server_tusinfosphere_guardium_database_activity_monitoringbig-iq_devicelinux_enterprise_serverbig-ip_access_policy_managerstorwize_v5000stn6800qradar_vulnerability_managersecurity_access_manager_for_web_8.0_firmwaredebian_linuxlinuxbig-iq_securitystarter_kit_for_cloudqradar_security_information_and_event_managerqradar_risk_managerbig-ip_link_controllernetscaler_sdxpureapplication_systembig-ip_wan_optimization_manageropensuseopen_enterprise_serverenterprise_linux_desktopsoftware_defined_network_for_virtual_environmentsmageiaeosstorwize_v3500storwize_v7000mac_os_xtraffix_signaling_delivery_controllerenterprise_linux_eussecurity_gatewaybashnetscaler_sdx_firmwarestn7800_firmwareenterprise_linux_for_power_big_endian_euslinux_enterprise_desktopstn6500_firmwarebig-ip_advanced_firewall_managerbig-iq_cloudlinux_enterprise_software_development_kitbig-ip_protocol_security_modulestorwize_v7000_firmwareworkload_deployersecurity_access_manager_for_mobile_8.0_firmwarestn7800enterprise_linux_for_scientific_computingstorwize_v3700enterprise_linux_server_from_rhuienterprise_linux_workstationflex_system_v7000gluster_storage_server_for_on-premisevcenter_server_appliancebig-ip_policy_enforcement_managerflex_system_v7000_firmwaren/aBourne-Again Shell (Bash)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2014-6278
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-10||HIGH
EPSS-89.22% / 99.52%
||
7 Day CHG~0.00%
Published-30 Sep, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.

Action-Not Available
Vendor-n/aGNU
Product-bashn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2014-6277
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-10||HIGH
EPSS-86.46% / 99.37%
||
7 Day CHG~0.00%
Published-27 Sep, 2014 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

Action-Not Available
Vendor-n/aGNU
Product-bashn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2014-6271
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-9.8||CRITICAL
EPSS-94.14% / 99.90%
||
7 Day CHG~0.00%
Published-24 Sep, 2014 | 18:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-07-28||Apply updates per vendor instructions.

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

Action-Not Available
Vendor-mageian/aIBM CorporationVMware (Broadcom Inc.)F5, Inc.Oracle CorporationNovellCitrix (Cloud Software Group, Inc.)SUSEApple Inc.Red Hat, Inc.openSUSEDebian GNU/LinuxArista Networks, Inc.Check Point Software Technologies Ltd.GNUQNAP Systems, Inc.Canonical Ltd.
Product-san_volume_controller_firmwaresmartcloud_entry_appliancesmartcloud_provisioningenterprise_managerbig-ip_local_traffic_managerarxenterprise_linux_for_power_big_endianstorwize_v5000_firmwareenterprise_linux_server_ausbig-ip_edge_gatewayzenworks_configuration_managementarx_firmwarebig-ip_application_acceleration_managerbig-ip_application_security_managerbig-ip_global_traffic_managerbig-ip_webacceleratorstorwize_v3500_firmwareenterprise_linuxenterprise_linux_serversecurity_access_manager_for_web_7.0_firmwarebig-ip_analyticsqtsstn6500virtualizationsan_volume_controllerenterprise_linux_for_ibm_z_systemsstudio_onsiteubuntu_linuxesxstorwize_v3700_firmwarestn6800_firmwareenterprise_linux_server_tusinfosphere_guardium_database_activity_monitoringbig-iq_devicelinux_enterprise_serverbig-ip_access_policy_managerstorwize_v5000stn6800qradar_vulnerability_managersecurity_access_manager_for_web_8.0_firmwaredebian_linuxlinuxbig-iq_securitystarter_kit_for_cloudqradar_security_information_and_event_managerqradar_risk_managerbig-ip_link_controllernetscaler_sdxpureapplication_systembig-ip_wan_optimization_manageropensuseopen_enterprise_serverenterprise_linux_desktopsoftware_defined_network_for_virtual_environmentsmageiaeosstorwize_v3500storwize_v7000mac_os_xtraffix_signaling_delivery_controllerenterprise_linux_eussecurity_gatewaybashnetscaler_sdx_firmwarestn7800_firmwareenterprise_linux_for_power_big_endian_euslinux_enterprise_desktopstn6500_firmwarebig-ip_advanced_firewall_managerbig-iq_cloudlinux_enterprise_software_development_kitbig-ip_protocol_security_modulestorwize_v7000_firmwareworkload_deployersecurity_access_manager_for_mobile_8.0_firmwarestn7800enterprise_linux_for_scientific_computingstorwize_v3700enterprise_linux_server_from_rhuienterprise_linux_workstationflex_system_v7000gluster_storage_server_for_on-premisevcenter_server_appliancebig-ip_policy_enforcement_managerflex_system_v7000_firmwaren/aBourne-Again Shell (Bash)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2007-2500
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-13.26% / 93.89%
||
7 Day CHG~0.00%
Published-04 May, 2007 | 00:00
Updated-07 Aug, 2024 | 13:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

server/parser/sprite_definition.cpp in GNU Gnash (aka GNU Flash Player) 0.7.2 allows remote attackers to execute arbitrary code via a large number of SHOWFRAME elements within a DEFINESPRITE element, which triggers memory corruption and enables the attacker to call free with an arbitrary address, probably resultant from a buffer overflow.

Action-Not Available
Vendor-n/aGNU
Product-flash_playern/a
CVE-2011-4862
Matching Score-8
Assigner-FreeBSD
ShareView Details
Matching Score-8
Assigner-FreeBSD
CVSS Score-10||HIGH
EPSS-92.58% / 99.73%
||
7 Day CHG~0.00%
Published-25 Dec, 2011 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.

Action-Not Available
Vendor-heimdal_projectn/aSUSEDebian GNU/LinuxGNUFedora ProjectMIT (Massachusetts Institute of Technology)openSUSEFreeBSD Foundation
Product-fedorafreebsddebian_linuxopensuselinux_enterprise_software_development_kitlinux_enterprise_serverinetutilskrb5-appllinux_enterprise_desktopheimdaln/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2008-1948
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-10||HIGH
EPSS-23.88% / 95.80%
||
7 Day CHG~0.00%
Published-21 May, 2008 | 10:00
Updated-07 Aug, 2024 | 08:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

Action-Not Available
Vendor-n/aGNU
Product-gnutlsn/a
CWE ID-CWE-189
Not Available
CVE-2017-9106
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.53% / 66.30%
||
7 Day CHG~0.00%
Published-18 Jun, 2020 | 13:08
Updated-05 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in adns before 1.5.2. adns_rr_info mishandles a bogus *datap. The general pattern for formatting integers is to sprintf into a fixed-size buffer. This is correct if the input is in the right range; if it isn't, the buffer may be overrun (depending on the sizes of the types on the current platform). Of course the inputs ought to be right. And there are pointers in there too, so perhaps one could say that the caller ought to check these things. It may be better to require the caller to make the pointer structure right, but to have the code here be defensive about (and tolerate with an error but without crashing) out-of-range integer values. So: it should defend each of these integer conversion sites with a check for the actual permitted range, and return adns_s_invaliddata if not. The lack of this check causes the SOA sign extension bug to be a serious security problem: the sign extended SOA value is out of range, and overruns the buffer when reconverted. This is related to sign extending SOA 32-bit integer fields, and use of a signed data type.

Action-Not Available
Vendor-n/aGNUFedora Project
Product-fedoraadnsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-9107
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.53% / 66.30%
||
7 Day CHG~0.00%
Published-18 Jun, 2020 | 13:06
Updated-05 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in adns before 1.5.2. It overruns reading a buffer if a domain ends with backslash. If the query domain ended with \, and adns_qf_quoteok_query was specified, qdparselabel would read additional bytes from the buffer and try to treat them as the escape sequence. It would depart the input buffer and start processing many bytes of arbitrary heap data as if it were the query domain. Eventually it would run out of input or find some other kind of error, and declare the query domain invalid. But before then it might outrun available memory and crash. In principle this could be a denial of service attack.

Action-Not Available
Vendor-n/aGNUFedora Project
Product-fedoraadnsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-9103
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.86% / 74.08%
||
7 Day CHG~0.00%
Published-18 Jun, 2020 | 14:53
Updated-05 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records.

Action-Not Available
Vendor-n/aGNUFedora ProjectopenSUSE
Product-fedoraadnsleapn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-7853
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.45% / 62.81%
||
7 Day CHG~0.00%
Published-13 Apr, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In libosip2 in GNU oSIP 4.1.0 and 5.0.0, a malformed SIP message can lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS.

Action-Not Available
Vendor-n/aGNU
Product-osipn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-7223
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.39% / 59.23%
||
7 Day CHG~0.00%
Published-22 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-7210
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.31% / 53.95%
||
7 Day CHG~0.00%
Published-21 Mar, 2017 | 06:21
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-6965
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.25% / 48.48%
||
7 Day CHG~0.00%
Published-17 Mar, 2017 | 08:55
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-4458
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-1.24% / 78.40%
||
7 Day CHG~0.00%
Published-12 Dec, 2013 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.

Action-Not Available
Vendor-n/aGNUSUSE
Product-linux_enterprise_serverlinux_enterprise_debuginfoglibcn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-17121
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.37% / 57.86%
||
7 Day CHG~0.00%
Published-04 Dec, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (memory access violation) or possibly have unspecified other impact via a COFF binary in which a relocation refers to a location after the end of the to-be-relocated section.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-16827
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.42% / 61.23%
||
7 Day CHG~0.00%
Published-15 Nov, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-16826
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.42% / 61.23%
||
7 Day CHG~0.00%
Published-15 Nov, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-4466
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.36% / 57.71%
||
7 Day CHG~0.00%
Published-19 Nov, 2013 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the dane_query_tlsa function in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.15 and 3.2.x before 3.2.5 allows remote servers to cause a denial of service (memory corruption) via a response with more than four DANE entries.

Action-Not Available
Vendor-n/aGNU
Product-gnutlsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-4237
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-1.42% / 79.80%
||
7 Day CHG~0.00%
Published-09 Oct, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.

Action-Not Available
Vendor-n/aGNU
Product-glibcn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-13090
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-8.8||HIGH
EPSS-8.67% / 92.08%
||
7 Day CHG~0.00%
Published-27 Oct, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GNU Wget: heap overflow in HTTP protocol handling

The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes by using the MIN() macro, but ends up passing the negative chunk length to retr.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. The attacker can corrupt malloc metadata after the allocated buffer.

Action-Not Available
Vendor-GNU ProjectDebian GNU/LinuxGNU
Product-wgetdebian_linuxWget
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2017-17126
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.38% / 58.41%
||
7 Day CHG~0.00%
Published-04 Dec, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The load_debug_section function in readelf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via an ELF file that lacks section headers.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-15804
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.25% / 47.81%
||
7 Day CHG~0.00%
Published-22 Oct, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.

Action-Not Available
Vendor-n/aGNU
Product-glibcn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-1914
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-2.43% / 84.53%
||
7 Day CHG~0.00%
Published-29 Apr, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.

Action-Not Available
Vendor-n/aGNU
Product-glibcn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2006-4146
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-1.26% / 78.57%
||
7 Day CHG~0.00%
Published-31 Aug, 2006 | 22:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations.

Action-Not Available
Vendor-n/aGNU
Product-gdbn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-15670
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.29%
||
7 Day CHG~0.00%
Published-20 Oct, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.

Action-Not Available
Vendor-n/aGNU
Product-glibcn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-0242
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-2.70% / 85.31%
||
7 Day CHG~0.00%
Published-08 Feb, 2013 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

Action-Not Available
Vendor-n/aGNU
Product-glibcn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2012-6711
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.11% / 29.42%
||
7 Day CHG~0.00%
Published-18 Jun, 2019 | 17:34
Updated-06 Aug, 2024 | 21:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv().

Action-Not Available
Vendor-n/aRed Hat, Inc.GNU
Product-bashenterprise_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-14729
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.70% / 71.12%
||
7 Day CHG~0.00%
Published-25 Sep, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2012-4424
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.61% / 68.74%
||
7 Day CHG~0.00%
Published-09 Oct, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.

Action-Not Available
Vendor-n/aGNU
Product-glibcn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 35
  • 36
  • Next
Details not found