GNU Bash Environment Variable Command Injection Vulnerability in OneSpan products

Advisory ID vasco-sa-20140930-bash

Revision number 1.0

Date of Release September 30, 2014 12:00 PM UTC+1

Last update October 17, 2014 12:00 PM UTC+1

Summary

On September 24, 2014, the GNU foundation publicly announced a vulnerability in the GNU Bash shell. Bash is a Unix shell developed as part of the GNU project as a replacement for the Bourne shell (sh). It has been distributed widely as part of the GNU operating system and is the default shell for Linux and OS X. The vulnerability is commonly referred to as the “shellshock” vulnerability.

Many Internet daemons, including telnet, SSH and web servers, invoke the Bash shell. The Bash shell uses environment variables to pass information into processes that are spawned from it. The vulnerability allows an attacker to inject arbitrary commands into a Bash shell using specially crafted environment variables.

The specific impact of the vulnerability depends on the process using the Bash shell. In the worst case, an unauthenticated remote attacker would be able to execute commands on an affected server.

Impacted Products

Following OneSpan products and services are affected by the vulnerability:

  • aXsGUARD Gatekeeper (all versions)
  • IDENTIKEY Federation Server (versions 1.3, 1.4 and 1.5)
  • MYDIGIPASS.COM

 

Description

The Bash shell uses environment variables to pass information into processes that are spawned from it. Environment variables can be used to store function definitions. Such environment variables start with “() {” and usually end with “};”.

However Bash executes any code in the environment variable after the function definition. This allows an attacker to create a function definition such as:

FUNCT=() { ignore; }; echo shellshock

This would cause the code “echo shellshock” to be executed when Bash processes its environment variables.

The impact of this vulnerability on OneSpan products varies depending on the affected product and the nature of the product usage.

This vulnerability has been assigned the Common Vulnerabilities and Exposures (CVE) IDs CVE-2014-6271 and CVE-2014-7169.

Severity Score

The tables below denote the CVSS 2.0 vulnerability score.

1. Attack vectors that do not require authentication

CVSS Base Score: 7.5
Access Vector Access Complexity

Authentication

Confidentiality Impact Integrity Impact Availability Impact
Network Low None Partial Partial Partial

 

CVSS Temporal Score: 7.1
Exploitability Remediation Level Report Confidence
Functional Not defined Confirmed

 

2. Attack vectors that require authentication

CVSS Base Score: 6.5
Access Vector Access Complexity Authentication Confidentiality Impact Integrity Impact Availability Impact
Network Low Single Partial  Partial Partial

 

CVSS Temporal Score: 6.2
Exploitability Remediation Level Report Confidence
Functional Not defined Confirmed

 

Product Fixes

OneSpan has patched following products:

  • aXsGUARD Gatekeeper 7.6.5, 7.7.0, 7.7.1, 7.7.2 and 7.7.3

OneSpan has patched following service:

  • MYDIGIPASS.COM

OneSpan will release patches for following products:

  • IDENTIKEY Federation Server 1.4.4 and 1.5.3, to be released on October 22, 2014

Location

For aXsGUARD Gatekeeper products:

OneSpan has already deployed patches for aXsGUARD Gatekeeper products via the automated update service. Customers that do not allow their system to receive updated via this service should contact OneSpan for instructions about how to obtain the patch.

For other products:

Customers with a maintenance contract can obtain fixed product releases from MyMaintenance. Customers without a maintenance contract should contact their sales representative.

Reference

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169

Legal Disclaimer

WHILE EVERY REASONABLE EFFORT IS MADE TO PROCESS AND PROVIDE INFORMATION THAT IS ACCURATE, ALL THE CONTENT AND INFORMATION IN THIS DOCUMENT ARE PROVIDED "AS IS" AND “AS AVAILABLE,” WITHOUT ANY REPRESENTATION OR ENDORSEMENT AND WITHOUT ANY EXPRESS OR IMPLIED GUARANTEE OF CURRENCY, COMPLETENESS OR SUITABILITY, OR ANY WARRANTY INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE OR PURPOSE. YOUR USE OF THIS DOCUMENT, ANY INFORMATION PROVIDED, OR OF MATERIALS LINKED FROM THIS DOCUMENT IS AT YOUR OWN RISK. VASCO RESERVES THE RIGHT TO CHANGE OR UPDATE THE INFORMATION IN THIS DOCUMENT AT ANY TIME AND AT ITS DISCRETION, AS AND WHEN NEW OR ADDITIONAL INFORMATION BECOMES AVAILABLE.

Copyright © 2014 VASCO Data Security, Inc., VASCO Data Security International GmbH. All rights reserved.

🖨 GNU Bash Environment Variable Command Injection Vulnerability in OneSpan products