CVE-2014-6271 (CNNVD-201409-938)
中文标题:
GNU Bash 远程代码执行漏洞
英文标题:
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environm...
漏洞描述
中文描述:
GNU Bash是美国软件开发者布莱恩-福克斯(Brian J. Fox)为GNU计划而编写的一个Shell(命令语言解释器),它运行于类Unix操作系统中(Linux系统的默认Shell),并能够从标准输入设备或文件中读取、执行命令,同时也结合了一部分ksh和csh的特点。 GNU Bash 4.3及之前版本中存在安全漏洞,该漏洞源于程序没有正确处理环境变量值内的函数定义。远程攻击者可借助特制的环境变量利用该漏洞执行任意代码。以下产品和模块可能会被利用:OpenSSH sshd中的ForceCommand功能,Apache HTTP Server中的mod_cgi和mod_cgid模块,DHCP客户端等。(说明:该漏洞的补丁并没有完全修复该问题,CNNVD-201409-956补充了不完整修复后仍存在的问题)
英文描述:
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| gnu | bash | * | - | - |
cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*
|
| arista | eos | * | - | - |
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
|
| oracle | linux | 4 | - | - |
cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*
|
| oracle | linux | 5 | - | - |
cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
|
| oracle | linux | 6 | - | - |
cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
|
| qnap | qts | * | - | - |
cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*
|
| qnap | qts | 4.1.1 | - | - |
cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*
|
| mageia | mageia | 3.0 | - | - |
cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
|
| mageia | mageia | 4.0 | - | - |
cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
|
| redhat | gluster_storage_server_for_on-premise | 2.1 | - | - |
cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*
|
| redhat | virtualization | 3.4 | - | - |
cpe:2.3:a:redhat:virtualization:3.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 4.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 5.9 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 6.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 6.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 5.9_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.9_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 6.4_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.4_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 6.5_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.5_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.3_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.3_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.4_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.4_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.5_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.5_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.6_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.7_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.7_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 5.0_ppc | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 5.9_ppc | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.9_ppc:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 6.0_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 6.4_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.4_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 7.0_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 6.5_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.5_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 7.3_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 7.4_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 7.5_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 7.6_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 7.7_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_scientific_computing | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_scientific_computing | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 5.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 5.9 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 6.2 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 6.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 6.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_from_rhui | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_from_rhui | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_from_rhui | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 6.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
|
| suse | studio_onsite | 1.3 | - | - |
cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
|
| opensuse | opensuse | 12.3 | - | - |
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
|
| opensuse | opensuse | 13.1 | - | - |
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
|
| opensuse | opensuse | 13.2 | - | - |
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
|
| suse | linux_enterprise_desktop | 11 | - | - |
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
|
| suse | linux_enterprise_desktop | 12 | - | - |
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 10 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
|
| suse | linux_enterprise_server | 11 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*
|
| suse | linux_enterprise_server | 12 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
|
| suse | linux_enterprise_software_development_kit | 11 | - | - |
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
|
| suse | linux_enterprise_software_development_kit | 12 | - | - |
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
|
| debian | debian_linux | 7.0 | - | - |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
|
| ibm | infosphere_guardium_database_activity_monitoring | 8.2 | - | - |
cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:8.2:*:*:*:*:*:*:*
|
| ibm | infosphere_guardium_database_activity_monitoring | 9.0 | - | - |
cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.0:*:*:*:*:*:*:*
|
| ibm | infosphere_guardium_database_activity_monitoring | 9.1 | - | - |
cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.1:*:*:*:*:*:*:*
|
| ibm | pureapplication_system | * | - | - |
cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:*
|
| ibm | pureapplication_system | 2.0.0.0 | - | - |
cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*
|
| ibm | qradar_risk_manager | 7.1.0 | - | - |
cpe:2.3:a:ibm:qradar_risk_manager:7.1.0:*:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.1.0 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.1.1 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.1.2 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.0 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.1 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.2 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.3 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.4 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.5 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.6 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.7 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.8 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.8.15 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8.15:*:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.9 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.9:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.0 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.0:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.1 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.1:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.2 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.2:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.3 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.3:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.4 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.4:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.6 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p1:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.8 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:-:*:*:*:*:*:*
|
| ibm | smartcloud_entry_appliance | 2.3.0 | - | - |
cpe:2.3:a:ibm:smartcloud_entry_appliance:2.3.0:*:*:*:*:*:*:*
|
| ibm | smartcloud_entry_appliance | 2.4.0 | - | - |
cpe:2.3:a:ibm:smartcloud_entry_appliance:2.4.0:*:*:*:*:*:*:*
|
| ibm | smartcloud_entry_appliance | 3.1.0 | - | - |
cpe:2.3:a:ibm:smartcloud_entry_appliance:3.1.0:*:*:*:*:*:*:*
|
| ibm | smartcloud_entry_appliance | 3.2.0 | - | - |
cpe:2.3:a:ibm:smartcloud_entry_appliance:3.2.0:*:*:*:*:*:*:*
|
| ibm | smartcloud_provisioning | 2.1.0 | - | - |
cpe:2.3:a:ibm:smartcloud_provisioning:2.1.0:*:*:*:*:*:*:*
|
| ibm | software_defined_network_for_virtual_environments | * | - | - |
cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:kvm:*:*:*
|
| ibm | starter_kit_for_cloud | 2.2.0 | - | - |
cpe:2.3:a:ibm:starter_kit_for_cloud:2.2.0:*:*:*:*:*:*:*
|
| ibm | workload_deployer | * | - | - |
cpe:2.3:a:ibm:workload_deployer:*:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.1 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.2 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.3 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.5 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.1 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.2 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.3 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.4 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.5 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.6 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.7 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.8 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.2 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.3 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.5 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
|
| ibm | storwize_v7000_firmware | * | - | - |
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*
|
| ibm | storwize_v5000_firmware | * | - | - |
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*
|
| ibm | storwize_v3700_firmware | * | - | - |
cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*
|
| ibm | storwize_v3500_firmware | * | - | - |
cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*
|
| ibm | flex_system_v7000_firmware | * | - | - |
cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*
|
| ibm | san_volume_controller_firmware | * | - | - |
cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*
|
| ibm | stn6500_firmware | * | - | - |
cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*
|
| ibm | stn6800_firmware | * | - | - |
cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*
|
| ibm | stn7800_firmware | * | - | - |
cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 10.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 12.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 14.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
|
| novell | zenworks_configuration_management | 10.3 | - | - |
cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
|
| novell | zenworks_configuration_management | 11 | - | - |
cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*
|
| novell | zenworks_configuration_management | 11.1 | - | - |
cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*
|
| novell | zenworks_configuration_management | 11.2 | - | - |
cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*
|
| novell | zenworks_configuration_management | 11.3.0 | - | - |
cpe:2.3:a:novell:zenworks_configuration_management:11.3.0:*:*:*:*:*:*:*
|
| novell | open_enterprise_server | 2.0 | - | - |
cpe:2.3:o:novell:open_enterprise_server:2.0:sp3:*:*:*:linux_kernel:*:*
|
| novell | open_enterprise_server | 11.0 | - | - |
cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*
|
| checkpoint | security_gateway | * | - | - |
cpe:2.3:a:checkpoint:security_gateway:*:*:*:*:*:*:*:*
|
| f5 | big-ip_access_policy_manager | * | - | - |
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_access_policy_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_advanced_firewall_manager | * | - | - |
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_advanced_firewall_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_analytics | * | - | - |
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
|
| f5 | big-ip_analytics | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_application_acceleration_manager | * | - | - |
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_application_acceleration_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_application_security_manager | * | - | - |
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_application_security_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_edge_gateway | * | - | - |
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
|
| f5 | big-ip_global_traffic_manager | * | - | - |
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_global_traffic_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_link_controller | * | - | - |
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
|
| f5 | big-ip_link_controller | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_local_traffic_manager | * | - | - |
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_local_traffic_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_policy_enforcement_manager | * | - | - |
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_policy_enforcement_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_protocol_security_module | * | - | - |
cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
|
| f5 | big-ip_wan_optimization_manager | * | - | - |
cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_webaccelerator | * | - | - |
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
|
| f5 | big-iq_cloud | * | - | - |
cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*
|
| f5 | big-iq_device | * | - | - |
cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*
|
| f5 | big-iq_security | * | - | - |
cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*
|
| f5 | enterprise_manager | * | - | - |
cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*
|
| f5 | traffix_signaling_delivery_controller | * | - | - |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
|
| f5 | traffix_signaling_delivery_controller | 3.3.2 | - | - |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.3.2:*:*:*:*:*:*:*
|
| f5 | traffix_signaling_delivery_controller | 3.4.1 | - | - |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.4.1:*:*:*:*:*:*:*
|
| f5 | traffix_signaling_delivery_controller | 3.5.1 | - | - |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.5.1:*:*:*:*:*:*:*
|
| f5 | traffix_signaling_delivery_controller | 4.1.0 | - | - |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.1.0:*:*:*:*:*:*:*
|
| f5 | arx_firmware | * | - | - |
cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:*
|
| citrix | netscaler_sdx_firmware | * | - | - |
cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*
|
| apple | mac_os_x | * | - | - |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
|
| vmware | vcenter_server_appliance | 5.0 | - | - |
cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*
|
| vmware | vcenter_server_appliance | 5.1 | - | - |
cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*
|
| vmware | vcenter_server_appliance | 5.5 | - | - |
cpe:2.3:a:vmware:vcenter_server_appliance:5.5:-:*:*:*:*:*:*
|
| vmware | esx | 4.0 | - | - |
cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
|
| vmware | esx | 4.1 | - | - |
cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
nvd.nist.gov
exploitdb
exploitdb
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
cve.org
cve.org
exploitdb
exploitdb
cve.org
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
CVSS评分详情
3.1 (adp)
CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2014-6271 |
2025-11-11 15:18:48 | 2025-11-11 07:33:51 |
| NVD | nvd_CVE-2014-6271 |
2025-11-11 14:54:34 | 2025-11-11 07:42:36 |
| CNNVD | cnnvd_CNNVD-201409-938 |
2025-11-11 15:09:29 | 2025-11-11 07:51:38 |
| EXPLOITDB | exploitdb_EDB-34765 |
2025-11-11 15:05:26 | 2025-11-11 08:30:21 |
| EXPLOITDB | exploitdb_EDB-34766 |
2025-11-11 15:05:25 | 2025-11-11 08:30:21 |
| EXPLOITDB | exploitdb_EDB-34777 |
2025-11-11 15:05:21 | 2025-11-11 08:30:22 |
| EXPLOITDB | exploitdb_EDB-34839 |
2025-11-11 15:05:21 | 2025-11-11 08:30:28 |
| EXPLOITDB | exploitdb_EDB-34860 |
2025-11-11 15:05:26 | 2025-11-11 08:30:30 |
| EXPLOITDB | exploitdb_EDB-34862 |
2025-11-11 15:05:26 | 2025-11-11 08:30:30 |
| EXPLOITDB | exploitdb_EDB-34879 |
2025-11-11 15:05:26 | 2025-11-11 08:30:31 |
| EXPLOITDB | exploitdb_EDB-34895 |
2025-11-11 15:05:21 | 2025-11-11 08:30:32 |
| EXPLOITDB | exploitdb_EDB-34896 |
2025-11-11 15:05:26 | 2025-11-11 08:30:32 |
| EXPLOITDB | exploitdb_EDB-34900 |
2025-11-11 15:05:25 | 2025-11-11 08:30:32 |
| EXPLOITDB | exploitdb_EDB-35115 |
2025-11-11 15:05:26 | 2025-11-11 08:30:51 |
| EXPLOITDB | exploitdb_EDB-35146 |
2025-11-11 15:05:40 | 2025-11-11 08:30:55 |
| EXPLOITDB | exploitdb_EDB-36503 |
2025-11-11 15:05:22 | 2025-11-11 08:33:23 |
| EXPLOITDB | exploitdb_EDB-36504 |
2025-11-11 15:05:22 | 2025-11-11 08:33:23 |
| EXPLOITDB | exploitdb_EDB-36609 |
2025-11-11 15:05:29 | 2025-11-11 08:33:31 |
| EXPLOITDB | exploitdb_EDB-37816 |
2025-11-11 15:05:28 | 2025-11-11 08:35:37 |
| EXPLOITDB | exploitdb_EDB-38849 |
2025-11-11 15:05:21 | 2025-11-11 08:37:27 |
| EXPLOITDB | exploitdb_EDB-39918 |
2025-11-11 15:05:21 | 2025-11-11 08:39:21 |
| EXPLOITDB | exploitdb_EDB-40619 |
2025-11-11 15:05:22 | 2025-11-11 08:40:56 |
| EXPLOITDB | exploitdb_EDB-40938 |
2025-11-11 15:05:25 | 2025-11-11 08:41:31 |
| EXPLOITDB | exploitdb_EDB-42938 |
2025-11-11 15:05:26 | 2025-11-11 08:45:05 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 226 -> 228
查看详细变更
- references_count: 224 -> 226
- tags_count: 37 -> 38
查看详细变更
- references_count: 222 -> 224
- tags_count: 36 -> 37
查看详细变更
- references_count: 220 -> 222
查看详细变更
- references_count: 218 -> 220
查看详细变更
- references_count: 215 -> 218
- tags_count: 32 -> 36
查看详细变更
- references_count: 211 -> 215
- tags_count: 23 -> 32
查看详细变更
- references_count: 209 -> 211
查看详细变更
- references_count: 207 -> 209
- tags_count: 21 -> 23
查看详细变更
- references_count: 205 -> 207
- tags_count: 19 -> 21
查看详细变更
- references_count: 203 -> 205
查看详细变更
- references_count: 201 -> 203
- tags_count: 18 -> 19
查看详细变更
- references_count: 199 -> 201
- tags_count: 17 -> 18
查看详细变更
- references_count: 197 -> 199
- tags_count: 16 -> 17
查看详细变更
- references_count: 195 -> 197
- tags_count: 15 -> 16
查看详细变更
- references_count: 193 -> 195
- tags_count: 14 -> 15
查看详细变更
- references_count: 187 -> 193
- tags_count: 9 -> 14
查看详细变更
- references_count: 185 -> 187
- tags_count: 7 -> 9
查看详细变更
- references_count: 183 -> 185
- tags_count: 5 -> 7
查看详细变更
- references_count: 181 -> 183
- tags_count: 4 -> 5
查看详细变更
- references_count: 171 -> 181
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201409-938
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 0 -> 191
- references_count: 177 -> 171
- data_sources: ['cve'] -> ['cve', 'nvd']