CVE ID
CVE-2014-6271
DESCRIPTION
A flaw was found in the way bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.
Unitrends Assessment
Related to the bash vulnerability in CVE-2014-6271 published on Sep 24, 2014
Risk to Unitrends systems: Low
Access to Unitrends systems is protected by credentials for both ssh and web access, so only people with credential access could exploit this on our systems.
RESOLUTION
This vulnerability has been present since 1987, but has now been published, and all Linux systems use bash and are exposed to this issue to some degree, so we have made the updated bash rpms available on the Unitrends repository.
Updated bash rpms for CentOS 5 & 6 for Unitrends appliances and UEB:
-
bash-3.2-33.el5.1.i386.rpm
-
bash-3.2-33.el5.1.x86_64.rpm
-
bash-4.1.2-15.el6_5.1.x86_64.rpm
To update to the new version of bash with the fix, either do 'yum update bash' from the command line, or perform an update from the UI.
For UVB, do 'apt-get install bash' to install bash-4.2-2ubuntu2.3
LINK TO ADVISORIES
NOTES
For additional information, see:
- https://access.redhat.com/articles/1200223
- https://securityblog.redhat.com/2014/09/24/bash-specially-craftedenvironment-variables-code-injection-attack