Guest

Preview Tool

Cisco Bug: CSCur05136 - Evaluation for bash vulnerability known as shellshock

Last Modified

Sep 12, 2019

Products (1)

  • Cisco Network Registrar

Known Affected Releases

6.2 7.2 8.0 8.1 8.2

Description (partial)

Symptom:
The following Cisco products

Cisco Network Registrar Jumpstart 7.2.x
Cisco Prime Network Registrar Jumpstart 8.0
Cisco Prime Network Registrar DHCP/DNS Authoritative Jumpstart Appliance 8.1
Cisco Prime Network Registrar DHCP/DNS Authoritative Jumpstart Appliance 8.2
Cisco Prime Network Registrar DNS Caching Server Jumpstart Appliance 8.1
Cisco Prime Network Registrar DNS Caching Server Jumpstart Appliance 8.2
Cisco Prime Network Registrar 8.2.x OVF distribution
Cisco Prime Network Registrar 8.1.x OVF distribution
Cisco Prime Network Registrar 8.0.x OVF distribution
Cisco Network Registrar 7.2.x OVF distribution

includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271 
CVE-2014-6277
CVE-2014-6278
CVE-2014-7169
CVE-2014-7186
CVE-2014-7187

This bug has been opened to address the potential impact on this product.

Note that this vulnerability only applies to the Jumpstart or the OVF (virtual appliance) distributions of these products. The individually installable software products (CNR/CPNR) are not affected. No authentication is required to exploit this vulnerability.

In any case, customers are advised to upgrade their operating systems with the latest version of the "bash" shell to avoid any exploitation vectors unrelated to these products.

Conditions:
This vulnerability only applies when running Linux and Solaris operating systems.
This vulnerability only exist if the server operating systems is configured to use dhcp to acquire its IP address. This is an uncommon and not recommended mode of operation when running these products on a server.
If the ssh server has been configured to restrict which commands a user may execute, this vulnerability may allow the user to circumvent the restrictions. However, these systems usually only have the root account.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.