Bash.Function.Definitions.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Bash.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. A remote attacker may be able exploit this to execute arbitrary code within the context of the application.

affected-products-logoAffected Products

Bash

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Upgrade to the latest version available from the website.
http://ftp.gnu.org/pub/gnu/bash/bash-3.0-patches/bash30-017
http://ftp.gnu.org/pub/gnu/bash/bash-3.1-patches/bash31-018
http://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-052
http://ftp.gnu.org/pub/gnu/bash/bash-4.0-patches/bash40-039
http://ftp.gnu.org/pub/gnu/bash/bash-4.1-patches/bash41-012
http://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-048
http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-025
Based on our analysis and attempts to leverage CVE-2014-7169 for remote code execution, we do not believe that it is remotely exploitable universally. However due to the nature of CVE-2014-7169 we believe the signature for CVE-2014-6271 can cover CVE-2014-7169 as well.
For CVE-2014-7186 and CVE-2014-7187, we believe the risk of it is low based on our analysis. To exploit it remotely, an attacker will probably have to leverage CVE-2014-6271 or CVE-2014-6278, both of which are covered by the signature in this report.

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-10-27 18.186 Sig Added
2021-03-31 18.049 Sig Added
2019-01-24 14.532 Sig Added
2018-10-19 13.476 Sig Added