Summary: | On September 24, 2014, a vulnerability in the Bash shell was publicly announced. The vulnerability; is related to the way in which shell functions are passed though environment variables. The; vulnerability may allow an attacker to inject commands into a Bash shell, depending on how the shell; is invoked. The Bash shell may be invoked by a number of processes including, but not limited to,; telnet, SSH, DHCP, and scripts hosted on web servers.;; All versions of GNU Bash starting with version 1.14 are affected by this vulnerability and the; specific impact is determined by the characteristics of the process using the Bash shell. In the; worst case, an unauthenticated remote attacker would be able to execute commands on an affected; server. However, in most cases involving Cisco products, authentication is required before; exploitation could be attempted.;; A number of Cisco products ship with or use an affected version of the Bash shell. The Bash shell is; a third-party software component that is part of the GNU software project and used by a number of; software vendors. As of this version of the Security Advisory, there have been a number of; vulnerabilities recently discovered in the Bash shell, and the investigation is ongoing. For; vulnerable products, Cisco has included information on the product versions that will contain the; fixed software, and the date these versions are expected to be published on the cisco.com download; page. This advisory will be updated as additional information becomes available. Cisco may release; free software updates that address this vulnerability if a product is determined to be affected by; this vulnerability. This advisory is available at the references. |
Description: | Summary: On September 24, 2014, a vulnerability in the Bash shell was publicly announced. The vulnerability is related to the way in which shell functions are passed though environment variables. The vulnerability may allow an attacker to inject commands into a Bash shell, depending on how the shell is invoked. The Bash shell may be invoked by a number of processes including, but not limited to, telnet, SSH, DHCP, and scripts hosted on web servers.
All versions of GNU Bash starting with version 1.14 are affected by this vulnerability and the specific impact is determined by the characteristics of the process using the Bash shell. In the worst case, an unauthenticated remote attacker would be able to execute commands on an affected server. However, in most cases involving Cisco products, authentication is required before exploitation could be attempted.
A number of Cisco products ship with or use an affected version of the Bash shell. The Bash shell is a third-party software component that is part of the GNU software project and used by a number of software vendors. As of this version of the Security Advisory, there have been a number of vulnerabilities recently discovered in the Bash shell, and the investigation is ongoing. For vulnerable products, Cisco has included information on the product versions that will contain the fixed software, and the date these versions are expected to be published on the cisco.com download page. This advisory will be updated as additional information becomes available. Cisco may release free software updates that address this vulnerability if a product is determined to be affected by this vulnerability. This advisory is available at the references.
Solution: See the referenced vendor advisory for a solution.
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|