Linux Bash Vulnerability for CVE-2014-6271

SUMMARY

Linux Bash Vulnerability for CVE-2014-6271

ISSUE

Purpose

To address the bash vulnerability in CVE-2014-6271 issue with Linux/Unix/Mac

Description

Related to the bash vulnerability in CVE-2014-6271 published on Sep 24, 2014

Risk to Unitrends systems:   Low

Access to Unitrends systems is protected by credentials for both ssh and web access, so only people with credential access could exploit this on our systems.

Details

A flaw was found in the way bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.

See https://access.redhat.com/security/cve/CVE-2014-6271 for details.

 

Resolution

This vulnerability has been present since 1987, but has now been published, and all Linux systems use bash and are exposed to this issue to some degree, so we have made the updated bash rpms available on the Unitrends repository.

Updated bash rpms for CentOS5 & 6 for Unitrends appliances and UEB:
  bash-3.2-33.el5.1.i386.rpm
  bash-3.2-33.el5.1.x86_64.rpm
  bash-4.1.2-15.el6_5.1.x86_64.rpm

To update to the new version of bash with the fix, either do 'yum update bash' from the command line, or perform an update from the UI

 For UVB, do 'apt-get install bash' to install bash-4.2-2ubuntu2.3

Third-Party Sources

Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section