GNU Bash Local Environment Variable Handling Command Injection (Mac OS X) (Shellshock)

critical Nessus Plugin ID 77971


The remote host is is affected by a remote code execution vulnerability, commonly referred to as Shellshock.


The remote Mac OS X host has a version of Bash prior to 3.2.53(1)-release installed. It is, therefore, affected by a command injection vulnerability via environment variable manipulation.
Depending on the configuration of the system, an attacker could remotely execute arbitrary code.


Apply the vendor-supplied patch.

See Also

Plugin Details

Severity: Critical

ID: 77971

File Name: macosx_shellshock_update.nasl

Version: 1.22

Type: local

Agent: macosx

Published: 9/30/2014

Updated: 11/27/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Critical

Score: 9.4


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2014-7169

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x, cpe:/a:gnu:bash

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/29/2014

Vulnerability Publication Date: 9/24/2014

CISA Known Exploited Vulnerability Due Dates: 7/28/2022

Exploitable With

Core Impact

Metasploit (Qmail SMTP Bash Environment Variable Injection (Shellshock))

Reference Information

CVE: CVE-2014-6271, CVE-2014-7169

BID: 70103

CERT: 252743

IAVA: 2014-A-0142