Happy sysadmin day, Peter. Thanks for all the help and hard work you guys do on my behalf. I used to run a pretty big webhosting company - xxxxx.com. Our sysadmins worked harder, longer and better than anyone else in the company. And because things so rarely broke, people had no idea how hard those sysadmins worked. Because of that, I'm religious about celebrating sysadmin day...
|Posted||Wed, 24 Sep 2014 21:59 PM UTC|
|Last Update||Thu, 2 Oct 2014 22:10 PM UTC (130 weeks ago)|
Shellshock update at 3 October
What a busy few days! Security researchers have found a few related bugs. And there are now (as of a day or two ago) patches for all of them.
We been working night and day to create a deshellshock script (if you are a syadamin, please feel free to review and provide improvements at https://github.com/pbkwee/deshellshock ).
We have created a page where customers can review the status of our running that script on their servers. So you can see if you were vulnerable (tip: you were) and whether we can detect any current vulnerabilities after applying any changes.
To review the status of your servers go to http://rimuhosting.com/cp/shellshock.jsp
We have emailed customers where we have access to all their servers and cannot detect the vulnerability on any of their servers.
We are continuing to work on the deshellshock script for other customers to see if we can get it working for even more servers.
If the shellshock page reports we cannot log in, please enable our login (per https://rimuhosting.com/knowledgebase/rimuhosting/rimuhosting-ssh-access)
Shellshock: the bash vulnerability
There is a vulnerability (actually a set of vulnerabilities) in most versions of bash.
Bash is used in a variety of ways. Via web scripts. OpenSSH environment variables. And probably a number of other ways no one has thought of yet. This means there are potentially many ways (vectors) this vulnerability could be exploited.
So it is very important to fix this issue.
Patching the vulnerability
To check if you are vulnerable, first check http://rimuhosting.com/cp/shellshock.jsp
This will report the results of https://github.com/pbkwee/deshellshock running on your server.
If we do not have access to your server you can run download and run https://github.com/pbkwee/deshellshock or submit a ticket via http://rimuhosting.com/cp/shellshock.jsp for us to manually do that for you.
For modern, supported distros you can simply run apt-get install bash. Or yum install bash. To install the fixes. This should work fine on Centos 7, Centos 6, Debian 7. And Debian 6 if you are using the lts repositories.#
Log in to subscribe to changes to this notice.
Set your contact details for future notifications.