Red Hat finds a security vulnerability named bash bug in bash shell. When a user accesses the vulnerability normally, the vulnerability allows attackers to execute code like in shell, this opens the door for various attacks. It is reported that its severity exceeds the previous "heartbleed" vulnerability. Detection Method
$ env x=‘() { :;}; echo vulnerable‘ bash -c "echo this is a test"
If the following content is returned: upgrade as soon as possible.
[[Email protected] ~] $ ENV x = '() {:;}; echo vulnerable 'bash-c "echo this is a test"
Vulnerable
This is a test solution: RHEL 5 solution 64-bit
Wget http://mirrors.aliyun.com/centos/5/updates/x86_64/RPMS/bash-3.2-33.el5.1.x86_64.rpm & rpm-uvh bash-3.2-33.el5.1.x86_64.rpm 32-bit
wget http://mirrors.aliyun.com/centos/5/updates/i386/RPMS/bash-3.2-33.el5.1.i386.rpm && rpm -Uvh bash-3.2-33.el5.1.i386.rpm
Centos 6 repair methods Yum-y update bash other fixes refer to the http://www.1987.name/166.html after the fix is completed [[email protected] ~] # Env x = '() {:;}; echo vulnerable 'bash-c "echo this is a test"
Bash: Warning: X: Ignoring Function Definition Attempt
Bash: Error importing function definition for 'X'
This is a test
You have new mail in/var/spool/mail/root
Bash vulnerability repair