SuSE 11.3 Security Update : bash (SAT Patch Number 9780)

Critical Nessus Plugin ID 77958

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 9.6

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

The command-line shell 'bash' evaluates environment variables, which allows the injection of characters and might be used to access files on the system in some circumstances. (CVE-2014-7169)

Please note that this issue is different from a previously fixed vulnerability tracked under CVE-2014-6271 and is less serious due to the special, non-default system configuration that is needed to create an exploitable situation.

To remove further exploitation potential we now limit the function-in-environment variable to variables prefixed with BASH_FUNC_. This hardening feature is work in progress and might be improved in later updates.

Additionally, two other security issues have been fixed :

- Nested HERE documents could lead to a crash of bash.
(CVE-2014-7186)

- Nesting of for loops could lead to a crash of bash.
(CVE-2014-7187)

Solution

Apply SAT patch number 9780.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=898346

https://bugzilla.novell.com/show_bug.cgi?id=898603

https://bugzilla.novell.com/show_bug.cgi?id=898604

http://support.novell.com/security/cve/CVE-2014-6271.html

http://support.novell.com/security/cve/CVE-2014-7169.html

http://support.novell.com/security/cve/CVE-2014-7186.html

http://support.novell.com/security/cve/CVE-2014-7187.html

Plugin Details

Severity: Critical

ID: 77958

File Name: suse_11_bash-140926.nasl

Version: 1.12

Type: local

Agent: unix

Published: 2014/09/29

Updated: 2021/01/19

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 9.6

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:bash, p-cpe:/a:novell:suse_linux:11:bash-doc, p-cpe:/a:novell:suse_linux:11:libreadline5, p-cpe:/a:novell:suse_linux:11:libreadline5-32bit, p-cpe:/a:novell:suse_linux:11:readline-doc, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/09/26

Exploitable With

Core Impact

Metasploit (Apache mod_cgi Bash Environment Variable Code Injection (Shellshock))

Reference Information

CVE: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187

IAVA: 2014-A-0142