Latest update December 20th, 2017 12:04 PM
Sep 30, 2014 Victor Okech Computer, Game, Mobile, Mobile Game, News, PC Game, Technology, Wearable Tech, World 0
Since Heartbleed the SSL vulnerability, comes Shell Shock Bash. Bash is a popular Linux command line utility that runs on almost all Linux servers irrespective of the Linux distro you have installed.
On September 24th, a vulnerability was reported in the GNU Bourne-Again-Shell (BASh, or Bash), specifically a flaw with how Bash processes values of environment variables, that allows remote code execution of varying types in many common configurations. The overall risk is severe due to bash being configured for use, by default, on most Linux servers.
In summary, below are some details on this vulnerability:
The National Cyber Awareness System describes the issue as follows:
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
It is very easy to check whether or not your server is vulnerable by running the following (safe to run) code:
cd /tmp; rm -f /tmp/echo; env 'x=() { (a)=>\' bash -c "echo date"; cat /tmp/echo
If your server isn’t vulnerable, then the following will be displayed:
bash: x: line 1: syntax error near unexpected token `=’
bash: x: line 1: `’
bash: error importing function definition for `x’
date
cat: /tmp/echo: No such file or directory
Or in some cases simply:
date
cat: /tmp/echo: No such file or directory
If your server is vulnerable, then the following will be displayed (with the date):
bash: x: line 1: syntax error near unexpected token `=’
bash: x: line 1: `’
bash: error importing function definition for `x’
Fri Sep 26 11:55:07 EDT 2014
And the file /tmp/echo will be created.
yum clean all
Updating Bash is as simple as running just one command: yum -y update bash
Or you can:
Optionally, it is possible to update all of the installed packages at once with the following command: yum -y update
apt-get autoclean
Updating Bash is as simple as running just one command: apt-get install --only-upgrade bash
Or you can:
Optionally, it is possible to Upgrade all of the installed packages at once with the following command: apt-get upgrade
Feature Image courtesy of Engadget
My goal is to aggregate your database aura to release its inner Tai Ji that will harmonize your site with Google's algorithm du jour yielding excellent karma with high rankings and tons of fans. I've read about this a lot and this will crush it dude....
Dec 20, 2017 0
Dec 23, 2015 0
Dec 20, 2017 0
Healing Blends Global in conjunction with Uzima University Medical School will conduct a Sickle Cell double-blind study in Kisumu, Kenya. The study will evaluate the effectiveness of Even Flo, an all-natural supplement, in reducing the frequency of crises in sickle cell patients. This study will...