ShellShock: CVE-2014-6271 vulnerability and emergency repair methods

Source: Internet
Author: User

ShellShock: CVE-2014-6271 vulnerability and emergency repair methods

About this vulnerability
Hello, a Linux security vulnerability was found to be more serious than "heartbleed", that is, the ShellShock: CVE-2014-6271 vulnerability, attackers can remotely execute arbitrary commands, full control of your server, A lower operating threshold than "heartbleed" makes it more risky than the former. The vulnerability prompt is as follows:
"GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs into ss a privilege boundary from Bash execution."

How to verify
$ Env x = '() {:;}; echo vulnerable 'bash-C' echo hello'
Run the preceding command on the terminal. If vulnerable is returned, the server is shot.
Replace bash with other shell types in the command to check whether other shells on the machine are shot.

Use website guard to fix security issues
360 website guard has supported the protection of this vulnerability. To ensure the security of your website, we recommend that you enable the protection function of website guard 360.
Note: Due to incomplete patch repair, resulting in a burst of CVE-2014-7169, can bypass the official patch in September 25, resulting in arbitrary file read vulnerability. We strongly recommend that you enable the protection function of website guard while upgrading the server patches.

How to fix System bugs
* GNU official patch address: http: // secliSts.org/oss-Sec/2014/q3/650
* Solutions for major release editions:

Debian:
View https://www.debian.org/security/2014/dsa-3032

Ubuntu:
View http://www.ubuntu.com/usn/usn-2362-1/

CentOS:
# Yum-y update bash

Fedora:
View https://bugzilla.redhat.com/show_bug.cgi? CVE-2014-6271

Redhat:

ProductPatch packDetailsRed Hat Enterprise Linux Hat Enterprise LinuxRed Hat Enterprise Linux 6bash-4.1.2-15.el6_5.1Red Hat Enterprise Linuxbash-4.1.2-15.el6_5.1.sjis.1Red Hat Enterprise Linuxbash-4.1.2-9.el6_2.1Red Hat Enterprise Linux 6.2 AUSbash-4.1.2-15.el6_4.1Red Hat Enterprise Linux 6.4 Linuxbash-3.2-33.el5_11.1.sjis.1Red Hat Enterprise Linux EUSRed Hat Enterprise Linux 5bash-3.2-33.el5.1Red Hat Enterprise Linuxbash-3.2-24.el5_6.1Red Hat Enterprise linux 5.6 LLbash-3.2-32.el5_9.2Red Hat Enterprise Linux 5.9 EUSRed Hat Enterprise Linux 4bash-3.0-27.el4.2Red Hat Enterprise Linux 4 ELS
Novel/SuSE:
View http://support.novell.com/security/cve/CVE-2014-6271.html

* Other releases can also be compiled by referring to the above method, or bash can be updated through the built-in package manager of the release.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.