"Shellshock" bash bug
Teo En Ming
singapore.mr.teo.en.ming at gmail.com
Fri Sep 26 16:04:19 UTC 2014
I have already made sure that my cPanel server is safe from the
Shellshock Bash vulnerability. Now I am trying to confirm my wireless
router is safe from the shellshock bug, which is also based on Linux.
Link for further reading:
http://seclists.org/snort/2014/q3/976
Thanks for the information.
--
Yours sincerely,
Teo En Ming
Singapore
On 26/09/2014 23:43, Kevin O'Gorman wrote:
> There has been a code-injection vulnerability in bash for the last 22
> years, recently discovered and named "Shellshock". It's nasty.
> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271
>
> Here's a quick one-liner to see if you're vulnerable:
> $ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
> vulnerable
> this is a test
> $
>
> If you get that result, update your bash from the repositories, and
> all should be well:
> $ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
> bash: warning: x: ignoring function definition attempt
> bash: error importing function definition for `x'
> this is a test
> $
>
> Safe computing to all
>
>
> --
> Kevin O'Gorman
> #define QUESTION ((bb) || (!b)) /* Shakespeare */
>
> Please consider the environment before printing this email.
>
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20140927/66570fe0/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 441 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20140927/66570fe0/attachment.gif>
More information about the ubuntu-users
mailing list