a según esto: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271

NO TIENE NADA QUE VER CON BOMBILLOS

National Cyber Awareness System

Vulnerability Summary for CVE-2014-6271 Original release date: 09/24/2014 Last
revised: 09/26/2014 Source: US-CERT/NIST Overview

GNU Bash through 4.3 processes trailing strings after function definitions in
the values of environment variables, which allows remote attackers to execute
arbitrary code via a crafted environment, as demonstrated by vectors involving
the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in
the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other
situations in which setting the environment occurs across a privilege boundary
from Bash execution, aka "ShellShock." NOTE: the original fix for this issue
was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that
is still present after the incorrect fix.  Impact CVSS Severity (version 2.0):
CVSS v2 Base Score: 10.0 (HIGH) (AV:N/AC:L/Au:N/C:C/I:C/A:C) (legend) Impact
Subscore: 10.0 Exploitability Subscore: 10.0 CVSS Version 2 Metrics: Access
Vector: Network exploitable Access Complexity: Low Authentication: Not required
to exploit Impact Type: Allows unauthorized disclosure of information; Allows
unauthorized modification; Allows disruption of service References to
Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided
these links to other web sites because they may have information that would be
of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are
more appropriate for your purpose. NIST does not necessarily endorse the views
expressed, or concur with the facts presented on these sites. Further, NIST
does not endorse any commercial products that may be mentioned on these sites.
Please address comments about this page to n...@nist.gov.  External Source:
CONFIRM Name: https://bugzilla.redhat.com/show_bug.cgi?id=1141597 Type: Patch
Information Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1141597
External Source: CONFIRM Name:
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
Hyperlink:
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/

-- 
Este mensaje ha sido analizado por MailScanner
en busca de virus y otros contenidos peligrosos,
y se considera que est� limpio.

______________________________________________________________________
Lista de correos del Grupo de Usuarios de Tecnologías Libres de Cuba.
Gutl-l@jovenclub.cu
https://listas.jovenclub.cu/cgi-bin/mailman/listinfo/gutl-l

Responder a