A flaw was found in the way bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.
Related to the bash vulnerability in CVE-2014-6271 published on Sep 24, 2014
Risk to Unitrends systems: Low
Access to Unitrends systems is protected by credentials for both ssh and web access, so only people with credential access could exploit this on our systems.
This vulnerability has been present since 1987, but has now been published, and all Linux systems use bash and are exposed to this issue to some degree, so we have made the updated bash rpms available on the Unitrends repository.
Updated bash rpms for CentOS 5 & 6 for Unitrends appliances and UEB:
To update to the new version of bash with the fix, either do 'yum update bash' from the command line, or perform an update from the UI.
For UVB, do 'apt-get install bash' to install bash-4.2-2ubuntu2.3
LINK TO ADVISORIES
- https://access.redhat.com/security/cve/CVE-2014-6271 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271
For additional information, see: