GNU Bash Local Environment Variable Handling Command Injection (Mac OS X) (Shellshock)

Critical Nessus Plugin ID 77971

Synopsis

The remote host is is affected by a remote code execution vulnerability, commonly referred to as Shellshock.

Description

The remote Mac OS X host has a version of Bash prior to 3.2.53(1)-release installed. It is, therefore, affected by a command injection vulnerability via environment variable manipulation.
Depending on the configuration of the system, an attacker could remotely execute arbitrary code.

Solution

Apply the vendor-supplied patch.

See Also

http://support.apple.com/kb/HT6495

http://www.nessus.org/u?b5039c7b

http://support.apple.com/kb/DL1767

http://support.apple.com/kb/DL1768

http://support.apple.com/kb/DL1769

http://seclists.org/oss-sec/2014/q3/650

https://www.invisiblethreat.ca/post/shellshock/

Plugin Details

Severity: Critical

ID: 77971

File Name: macosx_shellshock_update.nasl

Version: 1.15

Type: local

Agent: macosx

Published: 2014/09/30

Updated: 2019/11/25

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x, cpe:/a:gnu:bash

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/09/29

Vulnerability Publication Date: 2014/09/24

Exploitable With

Core Impact

Metasploit (Qmail SMTP Bash Environment Variable Injection (Shellshock))

Reference Information

CVE: CVE-2014-6271, CVE-2014-7169

BID: 70103

CERT: 252743

IAVA: 2014-A-0142

EDB-ID: 34765, 34766, 34777