语言:
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
http://seclists.org/oss-sec/2014/q3/650
http://www.nessus.org/u?dacf7829
https://www.invisiblethreat.ca/post/shellshock/
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
严重性: Critical
ID: 85630
文件名: ibm_storwize_1_5_0_4.nasl
版本: 1.12
类型: remote
系列: Misc.
发布时间: 2015/8/25
最近更新时间: 2022/12/5
支持的传感器: Nessus
风险因素: Critical
分数: 9.4
风险因素: Critical
基本分数: 10
时间分数: 8.7
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2014-7187
CPE: cpe:/h:ibm:storwize_unified_v7000, cpe:/a:ibm:storwize_v7000_unified_software
必需的 KB 项: Host/IBM/Storwize/version, Host/IBM/Storwize/machine_major, Host/IBM/Storwize/display_name
可利用: true
易利用性: Exploits are available
补丁发布日期: 2014/10/3
漏洞发布日期: 2014/9/24
CISA 已知可遭利用的漏洞到期日期: 2022/7/28
Core Impact
Metasploit (CUPS Filter Bash Environment Variable Code Injection (Shellshock))
CVE: CVE-2014-6271, CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187
BID: 70103, 70137, 70152, 70154, 70165, 70166
CERT: 252743
IAVA: 2014-A-0142