Centos/RH fix not 100% complete and you'll have to do this again.

also check if your web servers are running cgi scripts as bash scripts ....
this is a bigger problem in general as it's prone to alsorts of abuse

-- 
Martin Hepworth, CISSP
Oxford, UK

On 25 September 2014 13:30, Paul Stenning <p...@sp-tech.co.uk> wrote:

> Hi all,
>
> Please be aware of a serious security vulnerability that has been
> discovered in BASH.
>
> I received notification of this from a web hosting company I use regarding
> CentOS but it applies to all Linux distros.  Please update ASAP, especially
> web servers etc.
>
> Below is the message they sent to all customers which contains more info.
>
> Paul
>
> ----
>
> Hello,
>
> This message is being sent in order to make you aware of a recently
> discovered serious security vulnerability within the BASH shell environment
> which exists on almost every Linux-based server. The severity of this
> vulnerability is high, with multiple exploit vectors which may not require
> any level of privileged access to the system.
>
> We are taking this unusual step of emailing all customers directly,
> because of the wide reaching impact.
>
> Vendor updates have been released for all Redhat Enterprise Linux, CentOS
> and CloudLinux distributions.
>
> ** All UKDedicated managed servers will be automatically updated **
>
> If your servers are unmanaged, then is absolutely essential that you
> ensure your servers are fully updated. Use the yum package manager to
> update and protect against exploitation of this vulnerability.
>
> To ensure all packages on your systems are fully updated, run the
> following command from a root SSH session:
> yum -y update
> This will update all packages on your system without further prompts. You
> must maintain your SSH session for the duration of the update.
>
> If you only wish to update the bash packages:
> yum -y update bash
> Again, this will update without further prompts. You must maintain your
> SSH session for the duration of the update.
>
> If you run cPanel, and are not familiar with the command line process, you
> can use the ‘Update System Software’ function in WHM to update all packages.
>
> Updating packages is all that is required, you do not need to reboot your
> server.
>
> Please note that in all of the above examples, if your server has already
> updated itself automatically then you will be told that no updates are
> available - this is an indication that you are already updated. If you wish
> to ensure you have the updated package then please check the package
> version from a root SSH session using:
> rpm -q bash
>
> The updated version depends on the operating system you’re running,
> details of the updated packages for CentOS versions are below:
> CentOS-5: bash-3.2-33.el5.1
> CentOS-6: bash-4.1.2-15.el6_5.1
> CentOS-7: bash-4.2.45-5.el7_0.2
>
> For further reading, please see:
> https://securityblog.redhat.com/2014/09/24/bash-specially-
> crafted-environment-variables-code-injection-attack/
>
> At the time of writing this website was intermittently offline, you can
> see a cached version via Google cache:
> http://webcache.googleusercontent.com/search?q=cache:https://securityblog.
> redhat.com/2014/09/24/bash-specially-crafted-environment-
> variables-code-injection-attack/
>
> If you have any questions regarding this notification, please
> emailhelpd...@support.ukdedicated.com
>
> Regards,
>
> UKDedicated Support
>
>
> --
>
> *Paul Stenning*
> S&P Technology
> Box 170, 89 Commercial Road, Bournemouth, BH2 5RR
>
> p...@sp-tech.co.uk <mailto:p...@sp-tech.co.uk>
> www.sp-tech.co.uk <http://www.sp-tech.co.uk>
>
> /Before printing, please consider the environment./
>
> *Confidentiality*
> This email and its attachments (if any) are intended for the above named
> only and may be confidential. If they have come to you in error you must
> take no action based on them, nor must you copy or show them to anyone;
> please reply to this email and highlight the error, then delete them from
> your computer immediately.
>
> *Security Warning*
> Please note that this email has been created in the knowledge that email
> is not a 100% secure communications medium. We advise that you understand
> and observe this lack of security when emailing us.
>
> *Viruses*
> Although we have taken steps to ensure that this email and attachments are
> free from any virus, we advise that in keeping with good computing practice
> the recipient should ensure they are virus free.
>
> --
> Next meeting:  Bournemouth, Tuesday, 2014-10-07 20:00
> Meets, Mailing list, IRC, LinkedIn, ...  http://dorset.lug.org.uk/
> New thread on mailing list:  mailto:dorset@mailman.lug.org.uk
> How to Report Bugs Effectively:  http://goo.gl/4Xue
-- 
Next meeting:  Bournemouth, Tuesday, 2014-10-07 20:00
Meets, Mailing list, IRC, LinkedIn, ...  http://dorset.lug.org.uk/
New thread on mailing list:  mailto:dorset@mailman.lug.org.uk
How to Report Bugs Effectively:  http://goo.gl/4Xue

Reply via email to