Language:
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
http://seclists.org/oss-sec/2014/q3/650
http://www.nessus.org/u?dacf7829
https://www.invisiblethreat.ca/post/shellshock/
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Severity: Critical
ID: 85630
File Name: ibm_storwize_1_5_0_4.nasl
Version: 1.12
Type: remote
Family: Misc.
Published: 8/25/2015
Updated: 12/5/2022
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.5
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2014-7187
CPE: cpe:/a:ibm:storwize_v7000_unified_software, cpe:/h:ibm:storwize_unified_v7000
Required KB Items: Host/IBM/Storwize/version, Host/IBM/Storwize/machine_major, Host/IBM/Storwize/display_name
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/3/2014
Vulnerability Publication Date: 9/24/2014
CISA Known Exploited Vulnerability Due Dates: 7/28/2022
Core Impact
Metasploit (CUPS Filter Bash Environment Variable Code Injection (Shellshock))
CVE: CVE-2014-6271, CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187
BID: 70103, 70137, 70152, 70154, 70165, 70166
CERT: 252743
IAVA: 2014-A-0142