Developers Documentation



301 error for file:

User Tools

Site Tools

CVE 2014-7169

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

ClearCenter response

Short response

This issue affects non-privileged users accessing ClearOS via Shell, or non-privilged SSH.

Long response

This issue affects ClearOS versions 5.x and 6.x. It also affects the undistributed version of ClearOS 7 Alpha 0. Most ClearOS installations are not affected by this issue due to the fact that most systems are not configured to give users access to SSH or Shell. If your system is configured to give your users access to shell through SSH or other means, you may be vulnerable.


Ensure that your ClearOS system is up to date by running:

yum update


To validate your bash vulnerability status, manually run the following:

cd /tmp; rm -f /tmp/echo; env 'x=() { (a)=>\' bash -c "echo date"; cat /tmp/echo
bash: x: line 1: syntax error near unexpected token `='
bash: x: line 1: `'
bash: error importing function definition for `x'
Fri Sep 26 11:49:58 GMT 2014

If your system is vulnerable, the time and date information will be output on the screen and a file called /tmp/echo will be created.

If your system is not vulnerable, you will see output similar to:

$ cd /tmp; rm -f /tmp/echo; env 'x=() { (a)=>\' bash -c "echo date"; cat /tmp/echo
cat: /tmp/echo: No such file or directory
content/en_us/announcements_cve_cve-2014-7169.txt · Last modified: 2015/06/12 11:22 (external edit)