Linux re-exposure security vulnerability bash damage will be super-painstaking

Source: Internet
Author: User
Tags cve

September 25 Message: a Linux security vulnerability that is alleged to be more severe than "bleeding heart" was found, although no attack was found to exploit the vulnerability, but a lower operating threshold than "heart bleed" made it more dangerous than the former.

Bash is the software used to control the command prompt for a Linux computer. "Bleeding with the heart" allows hackers to spy on the computer but does not allow hackers to gain control of the computer, said Dan Gido, chief executive of Trail of bits of cyber security. Bash vulnerabilities are different, and hackers can use it to fully control the target computer system.

To make things worse, it's easier to take advantage of bash vulnerabilities by simply cutting and pasting a single line of software code to get results. Such a low threshold may attract more hackers to attack, which is where security experts are worried.

Tode Birzley, an engineering manager at Rapid7, the network security company, said the severity of the Bash vulnerability was rated at level 10, and the difficulty was rated as "low", which means more hackers could use it to create a more serious security crisis.

"Exploiting this vulnerability, an attacker could take over the entire operating system of the computer, Access confidential information, make changes to the system, and so on," Beardsley said. Anyone's computer system, if using bash software, needs to be patched immediately. ”

Experts recommend that conditional enterprise users can make unnecessary server disconnection to protect the server from bash vulnerabilities until the vulnerability is fixed.

Since the personal corporate server is Ubuntu's concern for such issues, here are the solutions for Red Hat and Ubuntu users to refer to.

If you have questions can add me: Weilai_lee Exchange.

Serious Bash Vulnerability Warning (cve-2014-6271)

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which a Llows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving Command feature in OpenSSH sshd, the mod_cgi and Mod_cgid modules in the Apache HTTP Server, scripts executed by Unspecifi Ed DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execut Ion.

Authentication:not required to exploit

Impact Type:allows unauthorized disclosure of information; allows unauthorized modification; Allows disruption of service

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6271

http://seclists.org/oss-sec/2014/q3/650

Https://blogs.akamai.com/2014/09/environment-bashing.html

The solution given by Red Hat system:

This problem can be resolved by updating bash and rebooting the system:

?
1 # yum update bash

Or:

?
1 # yum update bash-4.1.2-15.el6_5.1

This only updates the bash package and requires a system restart to take effect.

Ubuntu Users

You can use the following command to patch, without restarting:

?
12 apt-get update apt-get  install bash

Above from: Ladder net

Linux re-exposure security vulnerability bash damage will be super-painstaking

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.