Canonical Has Patched Bash Agains The Shellshock Exploit. Update Your Ubuntu 14.04 Or Ubuntu 12.04 System Now

What is the Shellshock exploit and what does it do?

A critical Bash vulnerability has been recently discovered, being referred by some as “Shellshock“.

Via this exploit, attackers can gain control of systems remote and execute malicious code. Technically, the systems that allow SSH access from remote connections or web servers that run server site scripting are in danger.

Attackers are able to launch malicious code on the server, locally or via OpenSSH by sending infected web request by setting headers in a web request, or by setting weird mime types.

Canonical Has Patched Bash Agains The Shellshock Exploit. Update Your Ubuntu 14.04 Or Ubuntu 12.04 System Now

Canonical has finally patched Bash properly and removed the Shellshock vulnerabilities:

Canonical has finally patched Bash and removed the Shellshock vulnerabilities (both vulnerabilities: CVE-2014-7186, CVE-2014-7187) and now, everybody using up to date Ubuntu 14.04, Ubuntu 12.04, Ubuntu 10.04 and derivative systems is safe from the Shellshock exploit.

To get the updates, on Linux Mint 17, Linux Mint 13, Pinguy OS 14.04, Elementary OS 0.3, Elementary OS 0.2, Deepin 2014, Peppermint Five, LXLE 14.04, Linux Lite 2.0, do:

$ sudo apt-get update
$ sudo apt-get dist-upgrade

How to test if your bash version is vulnerable:

This Bash critical issue has been discovered by the Red Hat developers, who have also posted a test command for you to see if your bash at risk or not. Open a terminal and launch the below command:

$ env x='() { :;}; echo vulnerable' bash -c "system"

A healthy bath will display the below output:

bash: system: command not found

Tagged with: , , , , , , , ,
Posted in The Linux and Unix Articles!

Leave a Reply

Your email address will not be published. Required fields are marked *

*

Subscribe

  

Subscribe to get the latest Linux news and how to guides directly on your e-mail!