The redirection implementation in parse.y in GNU Bash up to and including 4.3 bash43-026 allows remote malicious users to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu bash 1.14.2 |
||
gnu bash 1.14.3 |
||
gnu bash 2.01.1 |
||
gnu bash 2.02 |
||
gnu bash 3.0 |
||
gnu bash 3.0.16 |
||
gnu bash 4.3 |
||
gnu bash 1.14.6 |
||
gnu bash 1.14.7 |
||
gnu bash 2.04 |
||
gnu bash 2.05 |
||
gnu bash 3.2.48 |
||
gnu bash 4.0 |
||
gnu bash 1.14.4 |
||
gnu bash 1.14.5 |
||
gnu bash 2.02.1 |
||
gnu bash 2.03 |
||
gnu bash 3.1 |
||
gnu bash 3.2 |
||
gnu bash 1.14.0 |
||
gnu bash 1.14.1 |
||
gnu bash 2.0 |
||
gnu bash 2.01 |
||
gnu bash 4.1 |
||
gnu bash 4.2 |
Patch here, here, here ... everywhere, really
VMware is plugging away at Shellshock holes in 37 virtual appliance products, but has so far shipped clean code for just a handful of appliances. The company released a fix for cloud analytics kit vCenter Log Insight and offered updates on four others. The advisory said a variety of VMware appliances shipped with Shellshock-vulnerable Bash. Products running on Linux, Android, OSX and iOS could inherit the underlying vulnerability of their OS, and VMWare urges customers to contact their operating...