This document provides the text form of the CVE-2014-7169 Advisory Risk Matrices. Please note that the CVE numbers in this document correspond to the same CVE numbers in the CVE-2014-7169 Advisory
This page contains the following text format Risk Matrices:
This table provides the text form of the Risk Matrix for Oracle Sun Systems Products Suite.
CVE Identifier | Description |
---|---|
CVE-2014-7169 | Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Bash). Supported versions that are affected are 8, 9, 10 and 11. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: The CVSS score is taken from http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169. Includes fixes for CVE-2014-6271, CVE-2014-7169, CVE-2014-6278, CVE-2014-7186, CVE-2014-7187 and CVE-2014-6277. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C). (legend) [Advisory] |
This table provides the text form of the Risk Matrix for Oracle Linux.
CVE Identifier | Description |
---|---|
CVE-2014-7169 | Vulnerability in the Oracle Linux component of Oracle Linux (subcomponent: Bash). Supported versions that are affected are 4, 5, 6 and 7. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: The CVSS score is taken from http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169. Includes fixes for CVE-2014-6271, CVE-2014-7169, CVE-2014-6278, CVE-2014-7186, CVE-2014-7187 and CVE-2014-6277. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C). (legend) [Advisory] |