CVE-2014-7169
CRITICAL KEVGNU Bash <4.3 - Code Injection
Title source: llmDescription
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
Exploits (19)
References (161)
... and 141 more
Scores
CVSS v3
9.8
EPSS
0.9011
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2022-01-28
VulnCheck KEV
2014-09-30
InTheWild.io
2022-01-28
ENISA EUVD
EUVD-2014-7046
Classification
CWE
CWE-78
Status
draft
Affected Products (50)
gnu/bash
< 4.3
arista/eos
< 4.9.12
oracle/linux
oracle/linux
oracle/linux
qnap/qts
< 4.1.1
qnap/qts
qnap/qts
mageia/mageia
mageia/mageia
redhat/gluster_storage_server_for_on-premise
redhat/virtualization
redhat/enterprise_linux
redhat/enterprise_linux
redhat/enterprise_linux
... and 35 more
Timeline
Published
Sep 25, 2014
KEV Added
Jan 28, 2022
Tracked Since
Feb 18, 2026