openSUSE Security Update : bash (openSUSE-SU-2014:1242-1) (Shellshock)

critical Nessus Plugin ID 77967
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

The command-line shell 'bash' evaluates environment variables, which allows the injection of characters and might be used to access files on the system in some circumstances (CVE-2014-7169).

Please note that this issue is different from a previously fixed vulnerability tracked under CVE-2014-6271 and it is less serious due to the special, non-default system configuration that is needed to create an exploitable situation.

To remove further exploitation potential we now limit the function-in-environment variable to variables prefixed with BASH_FUNC_ . This hardening feature is work in progress and might be improved in later updates.

Additionaly two more security issues were fixed in bash:
CVE-2014-7186: Nested HERE documents could lead to a crash of bash.

CVE-2014-7187: Nesting of for loops could lead to a crash of bash.

Solution

Update the affected bash packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=898346

https://bugzilla.novell.com/show_bug.cgi?id=898603

https://bugzilla.novell.com/show_bug.cgi?id=898604

https://lists.opensuse.org/opensuse-updates/2014-09/msg00052.html

Plugin Details

Severity: Critical

ID: 77967

File Name: openSUSE-2014-564.nasl

Version: 1.19

Type: local

Agent: unix

Published: 9/29/2014

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:bash, p-cpe:/a:novell:opensuse:bash-debuginfo, p-cpe:/a:novell:opensuse:bash-debuginfo-32bit, p-cpe:/a:novell:opensuse:bash-debugsource, p-cpe:/a:novell:opensuse:bash-devel, p-cpe:/a:novell:opensuse:bash-lang, p-cpe:/a:novell:opensuse:bash-loadables, p-cpe:/a:novell:opensuse:bash-loadables-debuginfo, p-cpe:/a:novell:opensuse:libreadline6, p-cpe:/a:novell:opensuse:libreadline6-32bit, p-cpe:/a:novell:opensuse:libreadline6-debuginfo, p-cpe:/a:novell:opensuse:libreadline6-debuginfo-32bit, p-cpe:/a:novell:opensuse:readline-devel, p-cpe:/a:novell:opensuse:readline-devel-32bit, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/26/2014

Vulnerability Publication Date: 9/24/2014

Exploitable With

Core Impact

Metasploit (Qmail SMTP Bash Environment Variable Injection (Shellshock))

Reference Information

CVE: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187

IAVA: 2014-A-0142