FYI...
- http://tools.cisco.c...cationListing.x
GNU Bash Environmental Variable Command Injection Vuln
Advisory ID: cisco-sa-20140926-bash
- http://tools.cisco.c...a-20140926-bash
2014 Sep 26 - "Summary: On September 24, 2014, a vulnerability in the Bash shell was publicly announced. The vulnerability is related to the way in which shell functions are passed though environment variables. The vulnerability may allow an attacker to inject commands into a Bash shell, depending on how the shell is invoked. The Bash shell may be invoked by a number of processes including, but not limited to, telnet, SSH, DHCP, and scripts hosted on web servers.
All versions of GNU Bash starting with version 1.14 are affected by this vulnerability and the specific impact is determined by the characteristics of the process using the Bash shell. In the worst case, an unauthenticated remote attacker would be able to execute commands on an affected server. However, in most cases involving Cisco products, exploitation of the vulnerability results in an authenticated attacker having the ability to execute commands for which they are not authorized. A number of Cisco products ship with or leverage an affected version of the Bash shell. This advisory will be updated as additional information becomes available. Cisco may release free software updates that address this vulnerability if a product is determined to be affected by this vulnerability...
(See "Affected Products" list at the URL above.)
Rev 1.12- 2014-Oct-15 - Updated details on where to find fix information, details on testing tools, and the Affected Products, Vulnerable Products, and Products Confirmed Not Vulnerable sections.
Cisco IronPort - GNU bash...
- http://www.securityt....com/id/1030961
CVE Reference: CVE-2014-6271, CVE-2014-7169
Oct 2 2014
Cisco WebEx Meetings Server ...
- http://www.securityt....com/id/1030940
CVE Reference: https://web.nvd.nist...d=CVE-2014-3395
Oct 1 2014
- http://tools.cisco.c...e/CVE-2014-3395
Last Updated: 2014 Sep 30
- https://web.nvd.nist...d=CVE-2014-3400
Last revised: 10/06/2014
- http://tools.cisco.c...e/CVE-2014-3400
Last Updated: 2014 Oct 3
Advisory (ICSA-14-269-01)
Bash Command Injection Vulnerability
- https://ics-cert.us-.../ICSA-14-269-01
Last revised: Oct 03, 2014
Also see: https://www.us-cert....n-Vulnerability
Last revised: Sep 30, 2014
- https://www.us-cert....lerts/TA14-268A
Last revised: Sep 30, 2014
- http://www.kb.cert.org/vuls/id/252743
Last revised: 10 Oct 2014
Bash vuln -aka- Shellshock ...
- http://blog.trendmic...-cve-2014-6271/
Sep 25, 2014
> http://about-threats...bility-bash-bug
FREE protection for Shellshock
- http://www.trendmicr...loit/index.html
- http://www.securityt....com/id/1030890
CVE Reference:
- https://web.nvd.nist...d=CVE-2014-6271 - 10.0 (HIGH)
- https://web.nvd.nist...d=CVE-2014-6277 - 10.0 (HIGH)
- https://web.nvd.nist...d=CVE-2014-6278 - 10.0 (HIGH)
- https://web.nvd.nist...d=CVE-2014-7169 - 10.0 (HIGH)
- https://web.nvd.nist...d=CVE-2014-7186 - 10.0 (HIGH)
- https://web.nvd.nist...d=CVE-2014-7187 - 10.0 (HIGH)
Updated: Oct 6 2014 - "... archive entry has one or more follow-up message(s) listed..."
Original Entry Date: Sep 24 2014
Impact: Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Vendor Confirmed: Yes Exploit Included: Yes
Version(s): 4.3 ...
... vulnerability is being actively exploited...
Vendor URL: https://www.gnu.org/software/bash/
___
Semiannual Cisco IOS Software Security Advisory Bundled Publication
- http://www.cisco.com..._ERP_sep14.html
Sep 24, 2014 - "... Use the Cisco IOS Software Checker* to quickly determine whether a given Cisco IOS Software release is exposed to Cisco product vulnerabilities..."
* http://tools.cisco.c...ectIOSVersion.x
Edited by AplusWebMaster, 16 October 2014 - 03:50 AM.