Koozali.org: home of the SME Server

TA14-268A: GNU Bourne Again Shell (Bash) ‘Shellshock’ Vulnerability (CVE-2014-62

Offline ghorst352

  • ****
  • 180
  • +0/-0
Just seeing if there has been any discussion regarding this vulnerability that just came out.

https://www.us-cert.gov/ncas/alerts/TA14-268A

Offline DanB35

  • ****
  • 764
  • +0/-0
    • http://www.familybrown.org
You mean, like this topic, posted yesterday?
http://forums.contribs.org/index.php/topic,51137.0.html

There's an update already out for SME 8 and 9.  Install it and you're covered.
......

Offline jim7jim

  • **
  • 61
  • +0/-0
Can someone tell me the steps to install this? My software installer pane shows the system is up to date and when I do a 'yum install' I get back 'No Packages marked for Update'.

Also, is there a way to get the current version of Bash?

TIA

guest22

Also, is there a way to get the current version of Bash?

Maybe you have been caught in a mid air collision of package release, mirror sync and your yum.

Please check the Bash version by 'rpm -q bash' and see in the main post if you have the latest.

Offline jim7jim

  • **
  • 61
  • +0/-0
'rpm -q bash' yields -->   bash-3.2-33.el5_10.4

I saw you mention bash version 4.1.2 in another post but is that for CentOS 6? The version I have above is ok for CentOS 5 (SME 8.1), right?


Offline jim7jim

  • **
  • 61
  • +0/-0
Thank you very much for the assistance!

Offline ghorst352

  • ****
  • 180
  • +0/-0
Is there any reason why using bash --version is different than rpm -q bash command?   I bring this up as an alarm that is on the redhat forums so I would imagine somebody knows about this or perhaps I have been misguided from the forum.  Thanks.

[root@mail ~]# rpm -q bash
bash-3.2-33.el5_10.4
[root@mail ~]# bash --version
GNU bash, version 3.2.25(1)-release (i386-redhat-linux-gnu)

Offline ghorst352

  • ****
  • 180
  • +0/-0
Nevermind, this is a noted issue with the command not reflecting the correct version.

https://www.centos.org/forums/viewtopic.php?f=24&t=48648
« Last Edit: September 29, 2014, 06:32:54 PM by bhay3s »

Offline soundrolf

  • *
  • 38
  • +0/-0
There is a shellscript out to check the bash if vulnerable or not

https://github.com/hannob/bashcheck

Rolf

Offline devtay

  • *
  • 145
  • +0/-0
Thanks for posting this.

There is a shellscript out to check the bash if vulnerable or not

https://github.com/hannob/bashcheck

Rolf
You can't stop what's coming. It ain't all waiting on you.

guest22

Thanks for posting this.

Why please? What will you do with any outcome?

Offline devtay

  • *
  • 145
  • +0/-0
Not much.  :-P it's more for my peace of mind than anything else. Maybe learn a little more about my server and how to maintain it? I just appreciate that people are willing to help out here.
You can't stop what's coming. It ain't all waiting on you.

Offline Mntsnow

  • **
  • 59
  • +0/-0
    • http://www.mntsnow.com
Replying here as this is where the topic dealing with shellshock for SME9 linked me to...

Anyways I've looked and I do show the new version of bash (bash-4.1.2-15.el6_5.2) but when check against my server it still shows a vulnerability namely "CVE-2014-6277" as shown from the shellshock test from shellshocker.net.  Note: I added the colors below

Quote
root@sme-3 ~]# curl https://shellshocker.net/shellshock_test.sh | bash
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
101  2533  101  2533    0     0   6305      0 --:--:-- --:--:-- --:--:-- 12728
CVE-2014-6271 (original shellshock): not vulnerable
bash: line 16:  5024 Segmentation fault      bash -c "f() { x() { _;}; x() { _;} <<a; }" 2> /dev/null
CVE-2014-6277 (segfault): VULNERABLE
CVE-2014-6278 (Florian's patch): not vulnerable
CVE-2014-7169 (taviso bug): not vulnerable
CVE-2014-7186 (redir_stack bug): not vulnerable
CVE-2014-7187 (nested loops off by one): not vulnerable
CVE-2014-//// (exploit 3 on http://shellshocker.net/): not vulnerable
[root@sme-3 ~]# exit

What do I need to do to fix that issue or is it something I don't need to worry about?
SME-8 64bit
PowerEdge 1950 III
(2) Quad Core Xeon x5460 @ 3.16GHz
24Gb Memory
PERC 5i raid controller
4 x 500Gb SAS 7.2K Drives in Raid 5
Dual 1Gb Nics

Offline Stefano

  • *
  • 10,839
  • +2/-0
you should/could search for CVE-2014-6277 in RH's bugzilla and with google..

we can only wait for upstream bugfix