
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title> &#187; Shellshock Bash Vulnerability</title>
	<atom:link href="https://www.nikeshshk.com.np/tag/shellshock-bash-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.nikeshshk.com.np</link>
	<description></description>
	<lastBuildDate>Tue, 04 Nov 2025 10:25:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.2.4</generator>
	<item>
		<title>How to Protect your Server Against the Shellshock Bash Vulnerability</title>
		<link>https://www.nikeshshk.com.np/news/how-to-protect-your-server-against-the-shellshock-bash-vulnerability/</link>
		<comments>https://www.nikeshshk.com.np/news/how-to-protect-your-server-against-the-shellshock-bash-vulnerability/#comments</comments>
		<pubDate>Sat, 27 Sep 2014 15:49:53 +0000</pubDate>
		<dc:creator><![CDATA[Nikesh Shakya]]></dc:creator>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Shellshock Bash Vulnerability]]></category>

		<guid isPermaLink="false">http://www.nikeshshk.com.np/?p=783</guid>
		<description><![CDATA[On September 24, 2014, a GNU Bash vulnerability, referred to as Shellshock or the &#8220;Bash Bug&#8221;, was disclosed. In short, the vulnerability allows remote attackers to execute arbitrary code given certain conditions, by passing strings of code following environment variable assignments. Because of Bash&#8217;s ubiquitous status amongst Linux, BSD, and Mac OS X distributions, many computers are vulnerable to Shellshock; all unpatched Bash versions between 1.14 through 4.3 (i.e. all releases until now) are at risk. The Shellshock vulnerability can be exploited on systems that are running Services or applications that allow unauthorized remote users to assign Bash environment variables. Examples of exploitable systems include the following: Apache HTTP Servers that use CGI scripts (via mod_cgi and mod_cgid) that are written in Bash or launch to Bash subshells Certain DHCP clients OpenSSH servers that use the ForceCommand capability Various network-exposed services that use Bash A detailed description of the bug can be found at CVE-2014-6271 and CVE-2014-7169. Because the Shellshock vulnerability is very widespread&#8211;even more so than the&#160;<a href="https://www.nikeshshk.com.np/news/how-to-protect-your-server-against-the-shellshock-bash-vulnerability/" class="read-more">Continue Reading</a>]]></description>
				<content:encoded><![CDATA[<p>On September 24, 2014, a GNU Bash vulnerability, referred to as Shellshock or the &#8220;Bash Bug&#8221;, was disclosed. In short, the vulnerability allows remote attackers to execute arbitrary code given certain conditions, by passing strings of code following environment variable assignments. Because of Bash&#8217;s ubiquitous status amongst Linux, BSD, and Mac OS X distributions, many computers are vulnerable to Shellshock; all unpatched Bash versions between 1.14 through 4.3 (i.e. all releases until now) are at risk.</p>
<p>The Shellshock vulnerability can be exploited on systems that are running Services or applications that allow unauthorized remote users to assign Bash environment variables. Examples of exploitable systems include the following:</p>
<ul>
<li>Apache HTTP Servers that use CGI scripts (via <code>mod_cgi</code> and <code>mod_cgid</code>) that are written in Bash or launch to Bash subshells</li>
<li>Certain DHCP clients</li>
<li>OpenSSH servers that use the <code>ForceCommand</code> capability</li>
<li>Various network-exposed services that use Bash</li>
</ul>
<p>A detailed description of the bug can be found at <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271">CVE-2014-6271</a> and <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169">CVE-2014-7169</a>.</p>
<p>Because the Shellshock vulnerability is very widespread&#8211;even more so than the OpenSSL Heartbleed bug&#8211;and particularly easy to exploit, it is highly recommended that affected systems are properly updated to fix or mitigate the vulnerability as soon as possible. We will show you how to test if your machines are vulnerable and, if they are, how to update Bash to remove the vulnerability.</p>
<p>Note: <em>(Sept. 25, 2014 &#8211; 6:00pm EST)</em> At the time of writing, only an &#8220;incomplete fix&#8221; for the vulnerability has been released. As such, it is recommended to update your machines that run Bash immediately, and check back for updates and a complete fix.</p>
<div data-unique="check-system-vulnerability"></div>
<h2>Check System Vulnerability</h2>
<p>On each of your systems that run Bash, you may check for Shellshock vulnerability by running the following command at the <code>bash</code> prompt:</p>
<pre><code>env VAR='() { :;}; echo Bash is vulnerable!' bash -c "echo Bash Test"
</code></pre>
<p>The highlighted <code>echo Bash is vulnerable!</code> portion of the command represents where a remote attacker could inject malicious code; arbitrary code following a function definition within an environment variable assignment. Therefore, if you see the following output, your version of Bash is vulnerable and should be updated:</p>
<pre><code>Bash is vulnerable!
Bash Test
</code></pre>
<p>Otherwise, if your output does not include the simulated attacker&#8217;s payload, i.e. &#8220;Bash is vulnerable&#8221; is not printed as output, your version of bash is not vulnerable. It may look something like this:</p>
<pre><code>bash: warning: VAR: ignoring function definition attempt
bash: error importing function definition for `VAR'
Bash Test
</code></pre>
<p>If your version of Bash is vulnerable, read on to learn how to update Bash and fix the vulnerability.</p>
<h3>Test Remote Sites</h3>
<p>If you simply want to test if websites or specific CGI scripts are vulnerable, use this link:<a href="http://shellshock.brandonpotter.com/">&#8216;ShellShock&#8217; Bash Vulnerability CVE-2014-6271 Test Tool</a>.</p>
<p>Simply enter the URL of the website or CGI script you want to test in the appropriate form and submit.</p>
<div data-unique="fix-vulnerability-update-bash"></div>
<h2>Fix Vulnerability: Update Bash</h2>
<p>The easiest way to fix the vulnerability is to use your default package manager to update the version of Bash. The following subsections cover updating Bash on various Linux distributions, including Ubuntu, Debian, CentOS, Red Hat, and Fedora.</p>
<p>Note: <em>(Sept. 25, 2014 &#8211; 6:00pm EST)</em> At the time of writing, only an &#8220;incomplete fix&#8221; for the vulnerability has been released. As such, it is recommended to update your machines that run Bash immediately, and check back for updates and a complete fix.</p>
<h3>APT-GET: Ubuntu / Debian</h3>
<p>Update Bash to the latest version available via <code>apt-get</code>:</p>
<pre><code>sudo apt-get update &amp;&amp; sudo apt-get install --only-upgrade bash
</code></pre>
<p>Now check your system vulnerability again by running the command in the previous section (<a href="https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-shellshock-bash-vulnerability#check-system-vulnerability">Check System Vulnerability</a>).</p>
<h3>YUM: CentOS / Red Hat / Fedora</h3>
<p>Update Bash to the latest version available via the <code>yum</code>:</p>
<pre><code>sudo yum update bash
</code></pre>
<p>Now check your system vulnerability again by running the command in the previous section (<a href="https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-shellshock-bash-vulnerability#check-system-vulnerability">Check System Vulnerability</a>).</p>
<div data-unique="conclusion"></div>
<h2>Conclusion</h2>
<p>Be sure to update all of your affected servers to the latest version of Bash!</p>
]]></content:encoded>
			<wfw:commentRss>https://www.nikeshshk.com.np/news/how-to-protect-your-server-against-the-shellshock-bash-vulnerability/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
