Language:
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
http://seclists.org/oss-sec/2014/q3/650
http://www.nessus.org/u?dacf7829
https://www.invisiblethreat.ca/post/shellshock/
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Severity: Critical
ID: 85630
File Name: ibm_storwize_1_5_0_4.nasl
Version: 1.11
Type: remote
Family: Misc.
Published: 8/25/2015
Updated: 1/31/2022
Risk Factor: Critical
Score: 9.5
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal Vector: E:H/RL:OF/RC:C
CVSS Score Source: CVE-2014-7187
CPE: cpe:/h:ibm:storwize_unified_v7000, cpe:/a:ibm:storwize_v7000_unified_software
Required KB Items: Host/IBM/Storwize/version, Host/IBM/Storwize/machine_major, Host/IBM/Storwize/display_name
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/3/2014
Vulnerability Publication Date: 9/24/2014
CISA Known Exploited Dates: 7/28/2022
Core Impact
Metasploit (CUPS Filter Bash Environment Variable Code Injection (Shellshock))
CVE: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278