SUMMARY
Linux Bash Vulnerability for CVE-2014-6271
ISSUE
Purpose
To address the bash vulnerability in CVE-2014-6271 issue with Linux/Unix/Mac
Description
Related to the bash vulnerability in CVE-2014-6271 published on Sep 24, 2014Risk to Unitrends systems: Low
Access to Unitrends systems is protected by credentials for both ssh and web access, so only people with credential access could exploit this on our systems.Details
A flaw was found in the way bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.See https://access.redhat.com/security/cve/CVE-2014-6271 for details.
Resolution
This vulnerability has been present since 1987, but has now been published, and all Linux systems use bash and are exposed to this issue to some degree, so we have made the updated bash rpms available on the Unitrends repository.Updated bash rpms for CentOS5 & 6 for Unitrends appliances and UEB:
bash-3.2-33.el5.1.i386.rpm
bash-3.2-33.el5.1.x86_64.rpm
bash-4.1.2-15.el6_5.1.x86_64.rpm
To update to the new version of bash with the fix, either do 'yum update bash' from the command line, or perform an update from the UI
For UVB, do 'apt-get install bash' to install bash-4.2-2ubuntu2.3