PT-2014-9086 · Gnu+9 · Bash+10

Kyle George

·

Published

1970-01-01

·

Updated

2026-01-15

·

CVE-2014-6271

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Bash versions prior to 4.2.45-alt2 Bash versions prior to 3.2.51-alt3 PAN-OS and Panorama versions 5.0.14 and earlier PAN-OS and Panorama versions 5.1.9 and earlier PAN-OS and Panorama versions 6.0.5 and earlier PAN-OS and Panorama versions 6.1.0 and earlier
Description Bash is vulnerable to remote code execution due to flaws in how it evaluates environment variables. An attacker can exploit this by crafting malicious environment variables to override restrictions and execute arbitrary shell commands. This vulnerability affects systems where environment variables can be controlled by external actors, such as through SSH or web servers. The vulnerability can be exploited through multiple vectors. Successful exploitation does not necessarily result in root access, but rather execution with the privileges of the logged-in user. The vulnerability exists in
bash
and affects versions prior to 4.2.45-alt2 and 3.2.51-alt3. Additionally, PAN-OS and Panorama versions 5.0.14 and earlier, 5.1.9 and earlier, 6.0.5 and earlier, and 6.1.0 and earlier are also affected. The vulnerability stems from incorrect handling of trailing code in function definitions, allowing attackers to bypass environment restrictions.
Recommendations Update Bash to version 4.2.45-alt2 or later. Update Bash to version 3.2.51-alt3 or later. Update PAN-OS and Panorama to a version later than 6.1.0. Run
sudo pro fix USN-2362-1
to apply the fix for Ubuntu systems.

Exploit

Fix

RCE

OS Command Injection

Weakness Enumeration

Related Identifiers

ALSA-2025_16880
ALT-PU-2014-2179
ALT-PU-2014-2180
BDU:2014-00319
BDU:2015-00149
BDU:2015-00150
BDU:2015-00152
BDU:2015-00154
BDU:2015-00156
BDU:2015-00158
BDU:2015-00353
BDU:2015-04143
BDU:2015-04144
BDU:2015-04145
BDU:2015-04146
BDU:2015-04147
BDU:2015-04148
BDU:2015-05950
BDU:2015-05951
BDU:2015-05952
BDU:2015-05953
BDU:2015-05954
BDU:2015-05955
BDU:2015-05956
BDU:2015-05957
BDU:2015-05958
BDU:2015-09793
BDU:2015-09818
CESA-2014_1293
CVE-2014-6271
DLA-59-1
DSA-3032-1
ELSA-2014-1293
MGASA-2014-0388
OPENSUSE-SU-2014_1226-1
OPENSUSE-SU-2014_1229-1
OPENSUSE-SU-2014_1242-1
OPENSUSE-SU-2014_1254-1
OPENSUSE-SU-2024:10106-1
PAN-SA-2014-0004
RHSA-2014:1293
RHSA-2014:1294
RHSA-2014:1295
RHSA-2014:1354
RHSA-2014_1293
SUSE-SU-2014_1212-1
SUSE-SU-2014_1213-1
SUSE-SU-2014_1260-1
SUSE-SU-2017:2699-1
SUSE-SU-2017:2700-1
SUSE-SU-2017_2699-1
SUSE-SU-2017_2700-1
USN-2362-1

Affected Products

Alt Linux
Apache Http Server
Bash
Centos
Check Point Gaia
Cisco Ios Xe
Cisco Nexus
Openssh Sshd
Red Hat
Suse
Ubuntu