CVE-2014-7169 (CNNVD-201409-956)
中文标题:
GNU Bash 操作系统命令注入漏洞
英文标题:
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definiti...
漏洞描述
中文描述:
GNU Bash是美国软件开发者布莱恩-福克斯(Brian J. Fox)为GNU计划而编写的一个Shell(命令语言解释器),它运行于类Unix操作系统中(Linux系统的默认Shell),并能够从标准输入设备或文件中读取、执行命令,同时也结合了一部分ksh和csh的特点。 GNU Bash 4.3 bash43-025及之前版本中存在安全漏洞,该漏洞源于程序没有正确处理环境变量值内的畸形函数定义。远程攻击者可借助特制的环境变量利用该漏洞写入文件。以下产品和模块受到影响:OpenSSH sshd中的ForceCommand功能,Apache HTTP Server中的mod_cgi和mod_cgid模块,DHCP客户端等。(说明:CNNVD-201409-938漏洞的补丁并没有完全修复该问题,在CNNVD-201409-956中仍然出现)
英文描述:
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| gnu | bash | * | - | - |
cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*
|
| arista | eos | * | - | - |
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
|
| oracle | linux | 4 | - | - |
cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*
|
| oracle | linux | 5 | - | - |
cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
|
| oracle | linux | 6 | - | - |
cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
|
| qnap | qts | * | - | - |
cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*
|
| qnap | qts | 4.1.1 | - | - |
cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*
|
| mageia | mageia | 3.0 | - | - |
cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
|
| mageia | mageia | 4.0 | - | - |
cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
|
| redhat | gluster_storage_server_for_on-premise | 2.1 | - | - |
cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*
|
| redhat | virtualization | 3.4 | - | - |
cpe:2.3:a:redhat:virtualization:3.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 4.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 5.9 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 6.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 6.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 5.9_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.9_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 6.4_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.4_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 6.5_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.5_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.3_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.3_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.4_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.4_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.5_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.5_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.6_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.7_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.7_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 5.0_ppc | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 5.9_ppc | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.9_ppc:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 6.0_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 6.4_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.4_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 7.0_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 6.5_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.5_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 7.3_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 7.4_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 7.5_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 7.6_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian_eus | 7.7_ppc64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_scientific_computing | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_scientific_computing | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 5.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 5.9 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 6.2 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 6.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 6.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_from_rhui | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_from_rhui | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_from_rhui | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 6.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
|
| suse | studio_onsite | 1.3 | - | - |
cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
|
| opensuse | opensuse | 12.3 | - | - |
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
|
| opensuse | opensuse | 13.1 | - | - |
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
|
| opensuse | opensuse | 13.2 | - | - |
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
|
| suse | linux_enterprise_desktop | 11 | - | - |
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
|
| suse | linux_enterprise_desktop | 12 | - | - |
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 10 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
|
| suse | linux_enterprise_server | 11 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*
|
| suse | linux_enterprise_server | 12 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
|
| suse | linux_enterprise_software_development_kit | 11 | - | - |
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
|
| suse | linux_enterprise_software_development_kit | 12 | - | - |
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
|
| debian | debian_linux | 7.0 | - | - |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
|
| ibm | infosphere_guardium_database_activity_monitoring | 8.2 | - | - |
cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:8.2:*:*:*:*:*:*:*
|
| ibm | infosphere_guardium_database_activity_monitoring | 9.0 | - | - |
cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.0:*:*:*:*:*:*:*
|
| ibm | infosphere_guardium_database_activity_monitoring | 9.1 | - | - |
cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.1:*:*:*:*:*:*:*
|
| ibm | pureapplication_system | * | - | - |
cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:*
|
| ibm | pureapplication_system | 2.0.0.0 | - | - |
cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*
|
| ibm | qradar_risk_manager | 7.1.0 | - | - |
cpe:2.3:a:ibm:qradar_risk_manager:7.1.0:*:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.1.0 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.1.1 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.1.2 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.0 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.1 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.2 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.3 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.4 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.5 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.6 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.7 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.8 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.8.15 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8.15:*:*:*:*:*:*:*
|
| ibm | qradar_security_information_and_event_manager | 7.2.9 | - | - |
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.9:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.0 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.0:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.1 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.1:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.2 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.2:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.3 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.3:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.4 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.4:*:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.6 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p1:*:*:*:*:*:*
|
| ibm | qradar_vulnerability_manager | 7.2.8 | - | - |
cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:-:*:*:*:*:*:*
|
| ibm | smartcloud_entry_appliance | 2.3.0 | - | - |
cpe:2.3:a:ibm:smartcloud_entry_appliance:2.3.0:*:*:*:*:*:*:*
|
| ibm | smartcloud_entry_appliance | 2.4.0 | - | - |
cpe:2.3:a:ibm:smartcloud_entry_appliance:2.4.0:*:*:*:*:*:*:*
|
| ibm | smartcloud_entry_appliance | 3.1.0 | - | - |
cpe:2.3:a:ibm:smartcloud_entry_appliance:3.1.0:*:*:*:*:*:*:*
|
| ibm | smartcloud_entry_appliance | 3.2.0 | - | - |
cpe:2.3:a:ibm:smartcloud_entry_appliance:3.2.0:*:*:*:*:*:*:*
|
| ibm | smartcloud_provisioning | 2.1.0 | - | - |
cpe:2.3:a:ibm:smartcloud_provisioning:2.1.0:*:*:*:*:*:*:*
|
| ibm | software_defined_network_for_virtual_environments | * | - | - |
cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:kvm:*:*:*
|
| ibm | starter_kit_for_cloud | 2.2.0 | - | - |
cpe:2.3:a:ibm:starter_kit_for_cloud:2.2.0:*:*:*:*:*:*:*
|
| ibm | workload_deployer | * | - | - |
cpe:2.3:a:ibm:workload_deployer:*:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.1 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.2 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.3 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.5 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.1 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.2 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.3 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.4 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.5 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.6 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.7 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.8 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.2 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.3 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.5 | - | - |
cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
|
| ibm | storwize_v7000_firmware | * | - | - |
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*
|
| ibm | storwize_v5000_firmware | * | - | - |
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*
|
| ibm | storwize_v3700_firmware | * | - | - |
cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*
|
| ibm | storwize_v3500_firmware | * | - | - |
cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*
|
| ibm | flex_system_v7000_firmware | * | - | - |
cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*
|
| ibm | san_volume_controller_firmware | * | - | - |
cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*
|
| ibm | stn6500_firmware | * | - | - |
cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*
|
| ibm | stn6800_firmware | * | - | - |
cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*
|
| ibm | stn7800_firmware | * | - | - |
cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 10.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 12.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 14.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
|
| novell | zenworks_configuration_management | 10.3 | - | - |
cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
|
| novell | zenworks_configuration_management | 11 | - | - |
cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*
|
| novell | zenworks_configuration_management | 11.1 | - | - |
cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*
|
| novell | zenworks_configuration_management | 11.2 | - | - |
cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*
|
| novell | zenworks_configuration_management | 11.3.0 | - | - |
cpe:2.3:a:novell:zenworks_configuration_management:11.3.0:*:*:*:*:*:*:*
|
| novell | open_enterprise_server | 2.0 | - | - |
cpe:2.3:o:novell:open_enterprise_server:2.0:sp3:*:*:*:linux_kernel:*:*
|
| novell | open_enterprise_server | 11.0 | - | - |
cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*
|
| checkpoint | security_gateway | * | - | - |
cpe:2.3:a:checkpoint:security_gateway:*:*:*:*:*:*:*:*
|
| f5 | big-ip_access_policy_manager | * | - | - |
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_access_policy_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_advanced_firewall_manager | * | - | - |
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_advanced_firewall_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_analytics | * | - | - |
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
|
| f5 | big-ip_analytics | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_application_acceleration_manager | * | - | - |
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_application_acceleration_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_application_security_manager | * | - | - |
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_application_security_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_edge_gateway | * | - | - |
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
|
| f5 | big-ip_global_traffic_manager | * | - | - |
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_global_traffic_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_link_controller | * | - | - |
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
|
| f5 | big-ip_link_controller | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_local_traffic_manager | * | - | - |
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_local_traffic_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_policy_enforcement_manager | * | - | - |
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_policy_enforcement_manager | 11.6.0 | - | - |
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*
|
| f5 | big-ip_protocol_security_module | * | - | - |
cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
|
| f5 | big-ip_wan_optimization_manager | * | - | - |
cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
|
| f5 | big-ip_webaccelerator | * | - | - |
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
|
| f5 | big-iq_cloud | * | - | - |
cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*
|
| f5 | big-iq_device | * | - | - |
cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*
|
| f5 | big-iq_security | * | - | - |
cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*
|
| f5 | enterprise_manager | * | - | - |
cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*
|
| f5 | traffix_signaling_delivery_controller | * | - | - |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
|
| f5 | traffix_signaling_delivery_controller | 3.3.2 | - | - |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.3.2:*:*:*:*:*:*:*
|
| f5 | traffix_signaling_delivery_controller | 3.4.1 | - | - |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.4.1:*:*:*:*:*:*:*
|
| f5 | traffix_signaling_delivery_controller | 3.5.1 | - | - |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.5.1:*:*:*:*:*:*:*
|
| f5 | traffix_signaling_delivery_controller | 4.1.0 | - | - |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.1.0:*:*:*:*:*:*:*
|
| f5 | arx_firmware | * | - | - |
cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:*
|
| citrix | netscaler_sdx_firmware | * | - | - |
cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*
|
| apple | mac_os_x | * | - | - |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
|
| vmware | vcenter_server_appliance | 5.0 | - | - |
cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*
|
| vmware | vcenter_server_appliance | 5.1 | - | - |
cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*
|
| vmware | vcenter_server_appliance | 5.5 | - | - |
cpe:2.3:a:vmware:vcenter_server_appliance:5.5:-:*:*:*:*:*:*
|
| vmware | esx | 4.0 | - | - |
cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
|
| vmware | esx | 4.1 | - | - |
cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
nvd.nist.gov
exploitdb
exploitdb
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
cve.org
cve.org
exploitdb
exploitdb
CVSS评分详情
3.1 (adp)
CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2014-7169 |
2025-11-11 15:18:49 | 2025-11-11 07:33:53 |
| NVD | nvd_CVE-2014-7169 |
2025-11-11 14:54:34 | 2025-11-11 07:42:37 |
| CNNVD | cnnvd_CNNVD-201409-956 |
2025-11-11 15:09:29 | 2025-11-11 07:51:38 |
| EXPLOITDB | exploitdb_EDB-34765 |
2025-11-11 15:05:26 | 2025-11-11 08:30:21 |
| EXPLOITDB | exploitdb_EDB-34766 |
2025-11-11 15:05:25 | 2025-11-11 08:30:21 |
| EXPLOITDB | exploitdb_EDB-34777 |
2025-11-11 15:05:21 | 2025-11-11 08:30:22 |
| EXPLOITDB | exploitdb_EDB-34839 |
2025-11-11 15:05:21 | 2025-11-11 08:30:28 |
| EXPLOITDB | exploitdb_EDB-34860 |
2025-11-11 15:05:26 | 2025-11-11 08:30:30 |
| EXPLOITDB | exploitdb_EDB-34862 |
2025-11-11 15:05:26 | 2025-11-11 08:30:30 |
| EXPLOITDB | exploitdb_EDB-34879 |
2025-11-11 15:05:26 | 2025-11-11 08:30:31 |
| EXPLOITDB | exploitdb_EDB-34895 |
2025-11-11 15:05:21 | 2025-11-11 08:30:32 |
| EXPLOITDB | exploitdb_EDB-34896 |
2025-11-11 15:05:26 | 2025-11-11 08:30:32 |
| EXPLOITDB | exploitdb_EDB-35115 |
2025-11-11 15:05:26 | 2025-11-11 08:30:51 |
| EXPLOITDB | exploitdb_EDB-35146 |
2025-11-11 15:05:40 | 2025-11-11 08:30:55 |
| EXPLOITDB | exploitdb_EDB-36503 |
2025-11-11 15:05:22 | 2025-11-11 08:33:23 |
| EXPLOITDB | exploitdb_EDB-36504 |
2025-11-11 15:05:22 | 2025-11-11 08:33:23 |
| EXPLOITDB | exploitdb_EDB-36609 |
2025-11-11 15:05:29 | 2025-11-11 08:33:31 |
| EXPLOITDB | exploitdb_EDB-36933 |
2025-11-11 15:05:26 | 2025-11-11 08:33:57 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 203 -> 205
- tags_count: 31 -> 32
查看详细变更
- references_count: 199 -> 203
- tags_count: 22 -> 31
查看详细变更
- references_count: 197 -> 199
查看详细变更
- references_count: 195 -> 197
- tags_count: 20 -> 22
查看详细变更
- references_count: 193 -> 195
- tags_count: 18 -> 20
查看详细变更
- references_count: 191 -> 193
查看详细变更
- references_count: 189 -> 191
- tags_count: 17 -> 18
查看详细变更
- references_count: 187 -> 189
- tags_count: 16 -> 17
查看详细变更
- references_count: 185 -> 187
- tags_count: 15 -> 16
查看详细变更
- references_count: 183 -> 185
- tags_count: 14 -> 15
查看详细变更
- references_count: 177 -> 183
- tags_count: 9 -> 14
查看详细变更
- references_count: 175 -> 177
- tags_count: 7 -> 9
查看详细变更
- references_count: 173 -> 175
- tags_count: 5 -> 7
查看详细变更
- references_count: 171 -> 173
- tags_count: 4 -> 5
查看详细变更
- references_count: 161 -> 171
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201409-956
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 0 -> 191
- references_count: 166 -> 161
- data_sources: ['cve'] -> ['cve', 'nvd']