CVE-2014-6271: Bash Vulnerability

CVE ID

CVE-2014-6271

DESCRIPTION

A flaw was found in the way bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.

Unitrends Assessment

Related to the bash vulnerability in CVE-2014-6271 published on Sep 24, 2014

Risk to Unitrends systems: Low

Access to Unitrends systems is protected by credentials for both ssh and web access, so only people with credential access could exploit this on our systems.

RESOLUTION

This vulnerability has been present since 1987, but has now been published, and all Linux systems use bash and are exposed to this issue to some degree, so we have made the updated bash rpms available on the Unitrends repository.

Updated bash rpms for CentOS 5 & 6 for Unitrends appliances and UEB:

  • bash-3.2-33.el5.1.i386.rpm

  • bash-3.2-33.el5.1.x86_64.rpm

  • bash-4.1.2-15.el6_5.1.x86_64.rpm

To update to the new version of bash with the fix, either do 'yum update bash' from the command line, or perform an update from the UI.

For UVB, do 'apt-get install bash' to install bash-4.2-2ubuntu2.3

LINK TO ADVISORIES

NOTES

For additional information, see:

  • https://access.redhat.com/articles/1200223
  • https://securityblog.redhat.com/2014/09/24/bash-specially-craftedenvironment-variables-code-injection-attack

Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section