GNU Bash Local Environment Variable Handling Command Injection (Mac OS X) (Shellshock)

critical Nessus Plugin ID 77971

Synopsis

The remote host is is affected by a remote code execution vulnerability, commonly referred to as Shellshock.

Description

The remote Mac OS X host has a version of Bash prior to 3.2.53(1)-release installed. It is, therefore, affected by a command injection vulnerability via environment variable manipulation.
Depending on the configuration of the system, an attacker could remotely execute arbitrary code.

Solution

Apply the vendor-supplied patch.

See Also

http://support.apple.com/kb/HT6495

http://www.nessus.org/u?b5039c7b

http://support.apple.com/kb/DL1767

http://support.apple.com/kb/DL1768

http://support.apple.com/kb/DL1769

http://seclists.org/oss-sec/2014/q3/650

https://www.invisiblethreat.ca/post/shellshock/

Plugin Details

Severity: Critical

ID: 77971

File Name: macosx_shellshock_update.nasl

Version: 1.19

Type: local

Agent: macosx

Published: 9/30/2014

Updated: 6/29/2022

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2014-7169

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x, cpe:/a:gnu:bash

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/29/2014

Vulnerability Publication Date: 9/24/2014

CISA Known Exploited Dates: 7/28/2022

Exploitable With

Core Impact

Metasploit (Qmail SMTP Bash Environment Variable Injection (Shellshock))

Reference Information

CVE: CVE-2014-6271, CVE-2014-7169

BID: 70103

CERT: 252743

IAVA: 2014-A-0142

EDB-ID: 34765, 34766, 34777