IBM Storwize V7000 Unified 1.3.x < 1.4.3.5 / 1.5.x < 1.5.0.4 Multiple Vulnerabilities (Shellshock)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote IBM Storwize V7000 Unified device is affected by multiple
vulnerabilities.

Description :

The remote IBM Storwize V7000 Unified device is running version 1.3.x
prior to 1.4.3.5 or 1.5.x prior to 1.5.0.4. It is, therefore, affected
by the following vulnerabilities :

- A command injection vulnerability exists in GNU Bash
known as Shellshock. The vulnerability is due to the
processing of trailing strings after function
definitions in the values of environment variables.
This allows a remote attacker to execute arbitrary code
via environment variable manipulation depending on the
configuration of the system. (CVE-2014-6271)

- An out-of-bounds memory access error exists in GNU Bash
in file parse.y due to evaluating untrusted input during
stacked redirects handling. A remote attacker can exploit
this, via a crafted 'here' document, to execute arbitrary
code or cause a denial of service. (CVE-2014-7186)

- An off-by-one error exists in GNU Bash in the
read_token_word() function in file parse.y when handling
deeply-nested flow control constructs. A remote attacker
can exploit this, by using deeply nested loops, to
execute arbitrary code or cause a denial of service.
(CVE-2014-7187)

- A command injection vulnerability exists in GNU Bash
known as Shellshock. The vulnerability is due to the
processing of trailing strings after function
definitions in the values of environment variables.
This allows a remote attacker to execute arbitrary code
via environment variable manipulation depending on the
configuration of the system. (CVE-2014-6278) Note that
this vulnerability exists because of an incomplete fix
for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.

See also :

http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
http://seclists.org/oss-sec/2014/q3/650
http://www.nessus.org/u?dacf7829
https://www.invisiblethreat.ca/post/shellshock/
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html

Solution :

Upgrade to IBM Storwize V7000 Unified version 1.4.3.5 / 1.5.0.4 or
later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 9.0
(CVSS2#E:POC/RL:ND/RC:ND)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now