{"id":137,"date":"2014-09-25T21:00:00","date_gmt":"2014-09-25T21:00:00","guid":{"rendered":"http:\/\/test.blueshell.im\/Blog\/?p=137"},"modified":"2020-08-16T08:46:57","modified_gmt":"2020-08-16T08:46:57","slug":"us-cert-ta14-268a-gnu-bourne-again-shell-bash-shellshock-vulnerability-cve-2014-6271cve-2014-7169","status":"publish","type":"post","link":"http:\/\/www.blueshell.im\/Blog\/?p=137","title":{"rendered":"US-CERT TA14-268A: GNU Bourne Again Shell (Bash) \u2018Shellshock\u2019 Vulnerability (CVE-2014-6271,CVE-2014-7169)"},"content":{"rendered":"<p>The following is an alert from the US-Cert alert system to test if your system is vulnerable try cut and pasting the following line in the command line prompt on your Unix or Linux System<\/p>\n<p>env x='() { :;}; echo vulnerable&#8217; bash -c &#8220;echo this is a test&#8221;<\/p>\n<p>if you get back two lines one saying<\/p>\n<p>Vulnerable<\/p>\n<p>and another saying<\/p>\n<p>this is a test<\/p>\n<p>then your system needs patching &nbsp;if you just get this is a test then your ok. If your unsure as always contact us<\/p>\n<p>National Cyber Awareness System:<\/p>\n<div class=\"rss_item\">\n<div class=\"rss_title\"><a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-268A\">TA14-268A: GNU Bourne Again Shell (Bash) \u2018Shellshock\u2019 Vulnerability (CVE-2014-6271,CVE-2014-7169)<\/a><\/div>\n<div class=\"rss_pub_date\">09\/25\/2014 12:56 PM EDT<\/div>\n<div class=\"rss_description\">Original release date: September 25, 2014<\/p>\n<h3>Systems Affected<\/h3>\n<ul>\n<li>GNU Bash through 4.3.<\/li>\n<li>Linux, BSD, and UNIX distributions including but not limited to:\n<ul>\n<li><a href=\"http:\/\/lists.centos.org\/pipermail\/centos\/2014-September\/146099.html\">CentOS<\/a> 5 through 7<\/li>\n<li><a href=\"https:\/\/lists.debian.org\/debian-security-announce\/2014\/msg00220.html\">Debian<\/a><\/li>\n<li>Mac OS X<\/li>\n<li>Red Hat Enterprise Linux 4 through 7<\/li>\n<li><a href=\"http:\/\/www.ubuntu.com\/usn\/usn-2362-1\/\">Ubuntu<\/a> 10.04 LTS, 12.04 LTS, and 14.04 LTS<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Overview<\/h3>\n<p>A critical vulnerability has been reported in the GNU Bourne Again Shell (Bash), the common command-line shell used in most Linux\/UNIX operating systems and Apple\u2019s Mac OS X. The flaw could allow an attacker to remotely execute shell commands by attaching malicious code in environment variables used by the operating system <a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it\/\">[1]<\/a>. The United States Department of Homeland Security (DHS) is releasing this Technical Alert to provide further information about the GNU Bash vulnerability.<\/p>\n<h3>Description<\/h3>\n<p>GNU Bash versions 1.14 through 4.3 contain a flaw that processes commands placed after function definitions in the added environment variable, allowing remote attackers to execute arbitrary code via a crafted environment which enables network-based exploitation. [<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-6271\">2<\/a>, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-7169\">3<\/a>]<\/p>\n<p>Critical instances where the vulnerability may be exposed include: [<a href=\"https:\/\/access.redhat.com\/security\/cve\/CVE-2014-6271\">4<\/a>, <a href=\"http:\/\/securityblog.redhat.com\/2014\/09\/24\/bash-specially-crafted-environment-variables-code-injection-attack\/\">5<\/a>]<\/p>\n<ul>\n<li>Apache HTTP Server using mod_cgi or mod_cgid scripts either written in bash, or spawn subshells.<\/li>\n<li>Override or Bypass ForceCommand feature in OpenSSH sshd and limited protection for some Git and Subversion deployments used to restrict shells and allows arbitrary command execution capabilities.<\/li>\n<li>Allow arbitrary commands to run on a DHCP client machine, various Daemons and SUID\/privileged programs.<\/li>\n<li>Exploit servers and other Unix and Linux devices via Web requests, secure shell, telnet sessions, or other programs that use Bash to execute scripts.<\/li>\n<\/ul>\n<h3>Impact<\/h3>\n<p>This vulnerability is classified by industry standards as \u201cHigh\u201d impact with CVSS Impact Subscore 10 and \u201cLow\u201d on complexity, which means it takes little skill to perform. This flaw allows attackers to provide specially crafted environment variables containing arbitrary commands that can be executed on vulnerable systems. It is especially dangerous because of the prevalent use of the Bash shell and its ability to be called by an application in numerous ways.<\/p>\n<h3>Solution<\/h3>\n<p>Patches have been released to fix this vulnerability by major Linux vendors for affected versions. Solutions for CVE-2014-6271 do not completely resolve the vulnerability. It is advised to install existing patches and pay attention for updated patches to address CVE-2014-7169.<\/p>\n<p>Many UNIX-like operating systems, including Linux distributions, BSD variants, and Apple Mac OS X include Bash and are likely to be affected. Contact your vendor for updated information. A list of vendors can be found in CERT Vulnerability Note <a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/252743\">VU#252743<\/a> <a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/252743\">[6]<\/a>.<\/p>\n<p>US-CERT recommends system administrators review the vendor patches and the NIST Vulnerability Summary for <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-7169\">CVE-2014-7169<\/a>, to mitigate damage caused by the exploit.<\/p>\n<h3>References<\/h3>\n<ul>\n<li><a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it\/\">Ars Technica, Bug in Bash shell creates big security hole on anything with *nix in it; <\/a><\/li>\n<li><a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-6271\">DHS NCSD; Vulnerability Summary for CVE-2014-6271<\/a><\/li>\n<li><a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-7169\">DHS NCSD; Vulnerability Summary for CVE-2014-7169<\/a><\/li>\n<li><a href=\"https:\/\/access.redhat.com\/security\/cve\/CVE-2014-6271\">Red Hat, CVE-2014-6271 <\/a><\/li>\n<li><a href=\"https:\/\/securityblog.redhat.com\/2014\/09\/24\/bash-specially-crafted-environment-variables-code-injection-attack\/\">Red Hat, Bash specially-crafted environment variables code injection attack<\/a><\/li>\n<li><a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/252743\">CERT Vulnerability Note VU#252743<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The following is an alert from the US-Cert alert system to test if your system is vulnerable try cut and pasting the following line in the command line prompt on your Unix or Linux System env x='() { :;}; echo &hellip; <a href=\"http:\/\/www.blueshell.im\/Blog\/?p=137\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":104,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"_links":{"self":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/137"}],"collection":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=137"}],"version-history":[{"count":3,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/137\/revisions"}],"predecessor-version":[{"id":531,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/137\/revisions\/531"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/media\/104"}],"wp:attachment":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=137"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}