ShellShock: CVE-2014-6271 vulnerability and emergency repair methods
About this vulnerability
Hello, a Linux security vulnerability was found to be more serious than "heartbleed", that is, the ShellShock: CVE-2014-6271 vulnerability, attackers can remotely execute arbitrary commands, full control of your server, A lower operating threshold than "heartbleed" makes it more risky than the former. The vulnerability prompt is as follows:
"GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs into ss a privilege boundary from Bash execution."
How to verify
$ Env x = '() {:;}; echo vulnerable 'bash-C' echo hello'
Run the preceding command on the terminal. If vulnerable is returned, the server is shot.
Replace bash with other shell types in the command to check whether other shells on the machine are shot.
Use website guard to fix security issues
360 website guard has supported the protection of this vulnerability. To ensure the security of your website, we recommend that you enable the protection function of website guard 360.
Note: Due to incomplete patch repair, resulting in a burst of CVE-2014-7169, can bypass the official patch in September 25, resulting in arbitrary file read vulnerability. We strongly recommend that you enable the protection function of website guard while upgrading the server patches.
How to fix System bugs
* GNU official patch address: http: // secliSts.org/oss-Sec/2014/q3/650
* Solutions for major release editions:
Debian:
View https://www.debian.org/security/2014/dsa-3032
Ubuntu:
View http://www.ubuntu.com/usn/usn-2362-1/
CentOS:
# Yum-y update bash
Fedora:
View https://bugzilla.redhat.com/show_bug.cgi? CVE-2014-6271
Redhat:
ProductPatch packDetailsRed Hat Enterprise Linux Hat Enterprise LinuxRed Hat Enterprise Linux 6bash-4.1.2-15.el6_5.1Red Hat Enterprise Linuxbash-4.1.2-15.el6_5.1.sjis.1Red Hat Enterprise Linuxbash-4.1.2-9.el6_2.1Red Hat Enterprise Linux 6.2 AUSbash-4.1.2-15.el6_4.1Red Hat Enterprise Linux 6.4 Linuxbash-3.2-33.el5_11.1.sjis.1Red Hat Enterprise Linux EUSRed Hat Enterprise Linux 5bash-3.2-33.el5.1Red Hat Enterprise Linuxbash-3.2-24.el5_6.1Red Hat Enterprise linux 5.6 LLbash-3.2-32.el5_9.2Red Hat Enterprise Linux 5.9 EUSRed Hat Enterprise Linux 4bash-3.0-27.el4.2Red Hat Enterprise Linux 4 ELS
Novel/SuSE:
View http://support.novell.com/security/cve/CVE-2014-6271.html
* Other releases can also be compiled by referring to the above method, or bash can be updated through the built-in package manager of the release.