Bash Code Injection Vulnerability in Select NetApp Products
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
Subscribe to NTAP-20140924-0001 updates
Subscribe to NTAP-20140924-0001 advisory updates
Unsubscribe from NTAP-20140924-0001 advisory updates
Unsubscribe from NTAP-20140924-0001 advisory updates
Advisory ID: NTAP-20140924-0001 Version: KB 14.0 Last updated: 03/11/2015 Status: Final. CVEs: CVE-2014-6271, CVE-2014-7169, CVE-2014-6277, CVE-2014-6278, CVE-2014-7186, CVE-2014-7187
Summary
A vulnerability present in the GNU Bash implementation known as Shellshock may affect multiple NetApp products and the impact is under investigation. Successful exploitation of this vulnerability may result in execution of arbitrary code via a crafted environment variable. Certain products ship with an affected version of the Bash shell.
Impact
Exploitation of this vulnerability may lead to unauthorized disclosure of information, unauthorized modification, and/or disruption of service.
Technical Detail and Software Release Target Dates (registered access)
Vulnerability Scoring Details
CVE | Score | Vector |
---|---|---|
CVE-2014-6271 | 10.0 (CRITICAL) | AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C |
CVE-2014-6277 | 10.0 (CRITICAL) | AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C |
CVE-2014-6278 | 10.0 (CRITICAL) | AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C |
CVE-2014-7169 | 10.0 (CRITICAL) | AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C |
CVE-2014-7186 | 10.0 (CRITICAL) | AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C |
CVE-2014-7187 | 10.0 (CRITICAL) | AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C |
Exploitation and Public Announcements
NetApp is aware of public discussion of this vulnerability.
References
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6277
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6278
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7186
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7187
- http://www.kb.cert.org/vuls/id/252743
Affected Products
- Clustered Data ONTAP
- Data ONTAP Edge
- Data ONTAP operating in 7-Mode
- FlashRay
- NetApp VASA Provider for Clustered Data ONTAP 7.2 and above
- OnCommand Balance
- OnCommand Performance Manager (Unified Manager Performance Pkg)
- OnCommand Unified Manager for Clustered Data ONTAP
- RapidData Migration Solution
- SnapProtect
- StorageGRID9 (9.x and prior)
Products Not Affected
- 7-Mode Transition Tool
- ATTO FibreBridge
- Brocade Fabric Operating System Firmware
- Brocade Network Advisor Software
- Clustered Data ONTAP Antivirus Connector
- E-Series SANtricity Management Plug-ins (VMware vCenter)
- E-Series SANtricity Storage Manager
- E-Series SANtricity Web Services (REST API) for Web Services Proxy
- FAS/AFF BIOS
- Host Utilities - SAN for Linux
- Host Utilities - SAN for Windows
- NetApp Cloud Backup (formerly AltaVault)
- NetApp Manageability SDK
- NetApp NFS Plug-in for VMware VAAI
- NetApp Plug-in for Symantec NetBackup
- NetApp SANtricity SMI-S Provider
- NetApp SMI-S Provider
- NetApp Storage Encryption
- OnCommand Cloud Manager
- OnCommand Insight
- OnCommand System Manager 9.x
- OnCommand Unified Manager for 7-Mode (core package)
- OnCommand Workflow Automation
- Open Systems SnapVault Agent
- RAID Controller CTS2600 Legacy Engenio
- Service Processor
- Single Mailbox Recovery
- Snap Creator Framework
- SnapDrive for Unix
- SnapDrive for Windows
- SnapManager for Exchange
- SnapManager for Hyper-V
- SnapManager for MS SQL
- SnapManager for Oracle
- SnapManager for SAP
- SnapManager for Sharepoint
- Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 7.2 and above
- Storage Services Connector
- StorageGRID (formerly StorageGRID Webscale)
- System Setup
- Virtual Storage Console for VMware vSphere 7.2 and above
Software Versions and Fixes
NetApp's currently available patches are listed below.
Workarounds
Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) products available from third parties may have signatures available to stop an attack. Contact your security product vendors for additional information. DHCP clients in affected products are a potential exploit vector, which can be eliminated by the use of static IP addressing.
Obtaining Software Fixes
Software fixes will be made available through the NetApp Support website in the Software Download section.
https://mysupport.netapp.com/site/downloads/
Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.
Contact Information
Check http://mysupport.netapp.com for further
updates.
For questions, contact NetApp at:
Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)
Status of This Notice
Final.
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20140924-0001
Revision History
Revision # | Date | Comments |
---|---|---|
1.0 | 20140924 | Initial Public Release |
1.1 | 20140925 | Formatting |
2.0 | 20140925 | Updated Affected Products, Vulnerability Scoring, CVE, References |
3.0 | 20140926 | Updated Products Under Investigation, Products That Are Not Affected |
4.0 | 20140929 | Updated Products Under Investigation, Affected Products, Products That Are Not Affected, minor edits |
5.0 | 20141001 | Added Products now confirmed Not Affected & Target Release Dates, updated Workarounds and Keywords & CVE, minor edits, added bug numbers |
6.0 | 20141002 | Added Products with REVISED status section |
7.0 | 20141003 | Added products to Not Vulnerable & Software Versions and Fixes, product name edits, added StorageGRID KB, added Products Under Investigation, minor edits |
8.0 | 20141006 | Added products to Not Vulnerable, updated product name, minor edits |
8.0 / KB 1.0 | 20141008 | Migration to KB - no content change. |
KB 2.0 | 20141008 | Added products to Not Vulnerable |
KB 3.0 | 20141009 | Minor edits/formatting changes |
KB 4.0 | 20141017 | Added products to Not Vulnerable and product to Software Versions and Fixes, formatting changes, added link to the advisory |
KB 5.0 | 20141020 | Added products to Software Versions and Fixes; added table for Software Versions and Fixes |
KB 6.0 | 20141021 | Added products to Software Versions and Fixes |
KB 7.0 | 20141031 | Added products to Software Versions and Fixes |
KB 8.0 | 20141106 | Updated Software Versions and Fixes |
KB 9.0 | 20141114 | Corrected link in Software fixes for On Command Balance. |
KB 10.0 | 20141119 | Updated Software Versions and Fixes |
KB 11.0 | 20141201 | Updated Software Versions and Fixes, corrected name of "NetApp VASA Provider for Clustered Data ONTAP" |
KB 12.0 | 20150127 | Updated Software Versions and Fixes for "Cisco Nexus 5000" and "Cisco MDS" |
KB 13.0 | 20150204 | Added 7MTT to Products Not Affected; Summary reworded |
KB 14.0 | 20150311 | Updated Software Versions and Fixes for "Cisco Nexus 6000"; Final planned update |
This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.