[Hampshire] Urgent Bash Vulnerability (fwd)

Top Page

Reply to this message
Author: Andy Random
Date:  
To: Hampshire LUG Discussion List
CC: surrey
Subject: [Hampshire] Urgent Bash Vulnerability (fwd)

Since I've not seen it mentioned on the lists...

See below for the full details.

The idiots guide is run the command:

$ env X="() { :;} ; echo busted" `which bash` -c "echo completed"

If it comes back:

busted
completed

You are vulnerable and need to update.

I've patched my CentOS server today, I understand Debian and Ubuntu both
have fixes, I'll try updating my LUbuntu laptop when I get home, but my
MacBook Pro is currently still vulnerable.

---------- Forwarded message ----------
Date: Thu, 25 Sep 2014 13:04:48 +0100
From: "Gavin Westwood (Lugadmin)" <lug@???>
To: lugmaster@???
Subject: [lugmaster] Urgent Bash Vulnerability

You may want to pass this on to your emailing lists:


If you haven't already, apply any security updates for Bash for your
distribution. A major vulnerability has been found and it seems that
there are still variant attacks that work, so expect further updates.

I had already applied the updates for Debian last night on my servers, but
saw this article on the Guardian website today:
http://www.theguardian.com/technology/2014/sep/25/bug-bash-software-could-be-bigger-threat-heartbleed

The Reg also has a good article on the subject:
http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/

This email is the disclosure details:
http://seclists.org/oss-sec/2014/q3/650

Thanks

Gavin

--
Please post to: Hampshire@???
Web Interface: https://mailman.lug.org.uk/mailman/listinfo/hampshire
LUG URL: http://www.hantslug.org.uk
--------------------------------------------------------------