CVE-2014-7187

EXPLOITED

GNU Bash <4.3 - DoS

Title source: llm

Description

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.

Exploits (2)

exploitdb WORKING POC VERIFIED
by fdiskyou · pythonremotelinux
https://www.exploit-db.com/exploits/36933
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/34860

References (123)

... and 103 more

Scores

EPSS 0.8986
EPSS Percentile 99.6%

Details

VulnCheck KEV 2018-03-01
CWE
CWE-119
Status published
Products (25)
gnu/bash 1.14.0
gnu/bash 1.14.1
gnu/bash 1.14.2
gnu/bash 1.14.3
gnu/bash 1.14.4
gnu/bash 1.14.5
gnu/bash 1.14.6
gnu/bash 1.14.7
gnu/bash 2.0
gnu/bash 2.01
... and 15 more
Published Sep 28, 2014
Tracked Since Feb 18, 2026