Cisco Bug: CSCur05136 - Evaluation for bash vulnerability known as shellshock
Sep 12, 2019
- Cisco Network Registrar
Known Affected Releases
6.2 7.2 8.0 8.1 8.2
Symptom: The following Cisco products Cisco Network Registrar Jumpstart 7.2.x Cisco Prime Network Registrar Jumpstart 8.0 Cisco Prime Network Registrar DHCP/DNS Authoritative Jumpstart Appliance 8.1 Cisco Prime Network Registrar DHCP/DNS Authoritative Jumpstart Appliance 8.2 Cisco Prime Network Registrar DNS Caching Server Jumpstart Appliance 8.1 Cisco Prime Network Registrar DNS Caching Server Jumpstart Appliance 8.2 Cisco Prime Network Registrar 8.2.x OVF distribution Cisco Prime Network Registrar 8.1.x OVF distribution Cisco Prime Network Registrar 8.0.x OVF distribution Cisco Network Registrar 7.2.x OVF distribution includes a version of bash that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 This bug has been opened to address the potential impact on this product. Note that this vulnerability only applies to the Jumpstart or the OVF (virtual appliance) distributions of these products. The individually installable software products (CNR/CPNR) are not affected. No authentication is required to exploit this vulnerability. In any case, customers are advised to upgrade their operating systems with the latest version of the "bash" shell to avoid any exploitation vectors unrelated to these products. Conditions: This vulnerability only applies when running Linux and Solaris operating systems. This vulnerability only exist if the server operating systems is configured to use dhcp to acquire its IP address. This is an uncommon and not recommended mode of operation when running these products on a server. If the ssh server has been configured to restrict which commands a user may execute, this vulnerability may allow the user to circumvent the restrictions. However, these systems usually only have the root account.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases