Search the VMware Knowledge Base (KB)
View by Article ID

Impact of bash code injection vulnerability on VMware Customer Portals and web sites (CVE-2014-6271 and CVE-2014-7169, aka "shellshock") (2090817)

  • 1 Ratings

Purpose

The VMware Information Security Incident Response Team (vSIRT) has reviewed and determined the impact to VMware Customer Portals and Web Sites in relation to the bash code injection vulnerability described in CVE-2014-6271 and CVE-2014-7169.

Note: For information regarding VMware products and services, see VMware assessment of bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271 CVE-2014-7169, aka "shellshock") (2090740).

Resolution

These VMware websites and customer portal applications are known to be vulnerable:
  • None have been discovered at this time.

These VMware Customer Portals and websites are confirmed NOT vulnerable to the shellshock/bashbug vulnerability:
  • My VMware
  • VMware Communities
  • Partner Central
  • VMware Knowledge Base
  • Customer Support Upload Site
  • Downloads
  • Solution Exchange
  • Partner Locator
  • Labs
  • vca.vmware.com
  • Hands On Labs
  • Jobs (jobs.vmware.com)
  • VMware Developer Center
  • VMware Developer Center SCM
  • Air-Watch.com
  • VMware Webcasts
  • VMware Blogs
  • RabbitMQ
  • VMworld.com
  • TomcatExpert.com
  • Springsource.org
  • Optimize.vmware.com
  • LogInsight.vmware.com
  • Hyperic.com
  • Secure Transfer

Additional Information

To be alerted when this article is updated, click Subscribe to Document in the Actions box.

Pivotal Links

Pivotal RabbitMQ Knowledge Base:

See Also

Request a Product Feature

To request a new product feature or to provide feedback on a VMware product, please visit the Request a Product Feature page.

Feedback

  • 1 Ratings

Did this article help you?
This article resolved my issue.
This article did not resolve my issue.
This article helped but additional information was required to resolve my issue.

What can we do to improve this information? (4000 or fewer characters)




Please enter the Captcha code before clicking Submit.
  • 1 Ratings
Actions
KB: