IBM Storwize V7000 Unified 1.3.x < 1.4.3.5 / 1.5.x < 1.5.0.4 Multiple Vulnerabilities (Shellshock)

critical Nessus Plugin ID 85630

Synopsis

The remote IBM Storwize V7000 Unified device is affected by multiple vulnerabilities.

Description

The remote IBM Storwize V7000 Unified device is running version 1.3.x prior to 1.4.3.5 or 1.5.x prior to 1.5.0.4. It is, therefore, affected by the following vulnerabilities :

- A command injection vulnerability exists in GNU Bash known as Shellshock. The vulnerability is due to the processing of trailing strings after function definitions in the values of environment variables.
This allows a remote attacker to execute arbitrary code via environment variable manipulation depending on the configuration of the system. (CVE-2014-6271)
- An out-of-bounds memory access error exists in GNU Bash in file parse.y due to evaluating untrusted input during stacked redirects handling. A remote attacker can exploit this, via a crafted 'here' document, to execute arbitrary code or cause a denial of service. (CVE-2014-7186)

- An off-by-one error exists in GNU Bash in the read_token_word() function in file parse.y when handling deeply-nested flow control constructs. A remote attacker can exploit this, by using deeply nested loops, to execute arbitrary code or cause a denial of service.
(CVE-2014-7187)

- A command injection vulnerability exists in GNU Bash known as Shellshock. The vulnerability is due to the processing of trailing strings after function definitions in the values of environment variables.
This allows a remote attacker to execute arbitrary code via environment variable manipulation depending on the configuration of the system. (CVE-2014-6278) Note that this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.

Solution

Upgrade to IBM Storwize V7000 Unified version 1.4.3.5 / 1.5.0.4 or later.

See Also

http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898

http://seclists.org/oss-sec/2014/q3/650

http://www.nessus.org/u?dacf7829

https://www.invisiblethreat.ca/post/shellshock/

http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html

Plugin Details

Severity: Critical

ID: 85630

File Name: ibm_storwize_1_5_0_4.nasl

Version: 1.11

Type: remote

Family: Misc.

Published: 8/25/2015

Updated: 1/31/2022

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2014-7187

Vulnerability Information

CPE: cpe:/h:ibm:storwize_unified_v7000, cpe:/a:ibm:storwize_v7000_unified_software

Required KB Items: Host/IBM/Storwize/version, Host/IBM/Storwize/machine_major, Host/IBM/Storwize/display_name

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/3/2014

Vulnerability Publication Date: 9/24/2014

CISA Known Exploited Dates: 7/28/2022

Exploitable With

Core Impact

Metasploit (CUPS Filter Bash Environment Variable Code Injection (Shellshock))

Reference Information

CVE: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278

BID: 70103, 70137, 70152, 70154, 70165, 70166

CERT: 252743

IAVA: 2014-A-0142

EDB-ID: 34765, 34766, 34777, 34860