gnu bash CVE-2014-7169 is a vulnerability in GNU Bash
Published on September 25, 2014

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

NVD

Known Exploited Vulnerability

This GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code. This CVE correctly remediates the vulnerability in CVE-2014-6271.

The following remediation steps are recommended / required by July 28, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2014-7169 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2014-7169

You can be notified by stack.watch whenever vulnerabilities like CVE-2014-7169 are published in these products:

 

What versions of Bash are vulnerable to CVE-2014-7169?