<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 TRANSITIONAL//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="GENERATOR" content="GtkHTML/4.6.6">
</head>
<body link="#0000ff">
I've so far had no problems updating CENTos servers with a simple update of bash.<br>
<br>
I'm not sure how accurate this test is but the befores and afters seem to be consistent:<br>
<br>
<a href="https://community.qualys.com/blogs/securitylabs/2014/09/24/bash-remote-code-execution-vulnerability-cve-2014-6271">https://community.qualys.com/blogs/securitylabs/2014/09/24/bash-remote-code-execution-vulnerability-cve-2014-6271</a><br>
<br>
Right now I am most worried about Linux based border routers and VM hosts such as Proxmox. The latter is Debian based.<br>
<br>
Cheers<br>
g.<br>
<br>
<br>
On Thu, 2014-09-25 at 16:32 +1000, Pinkerton, Eric (AU Sydney) wrote:
<blockquote type="CITE">Heads up, shellshock botnet payloads are already hitting honeypots..<br>
<br>
<br>
<br>
<a href="https://gist.github.com/anonymous/929d622f3b36b00c0be1">https://gist.github.com/anonymous/929d622f3b36b00c0be1</a><br>
<br>
<br>
<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"><b>From:</b> AusNOG [mailto:ausnog-bounces@lists.ausnog.net]
<b>On Behalf Of </b>Alex Samad - Yieldbroker<br>
<b>Sent:</b> Thursday, 25 September 2014 2:59 PM<br>
<b>To:</b> Kush, Nishchal<br>
<b>Cc:</b> ausnog@lists.ausnog.net<br>
<b>Subject:</b> Re: [AusNOG] bash bug !<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
I believe the initial released patch was incomplete<br>
<br>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1146319">https://bugzilla.redhat.com/show_bug.cgi?id=1146319</a><br>
<br>
<br>
<br>
<br>
<br>
A<br>
<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"><b>From:</b> Kush, Nishchal [<a href="mailto:kush@kush.com.fj">mailto:kush@kush.com.fj</a>]
<br>
<b>Sent:</b> Thursday, 25 September 2014 3:03 PM<br>
<b>To:</b> Alex Samad - Yieldbroker<br>
<b>Cc:</b> <a href="mailto:ausnog@lists.ausnog.net">ausnog@lists.ausnog.net</a><br>
<b>Subject:</b> Re: [AusNOG] bash bug !<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
Hi <br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
<br>
</blockquote>
<blockquote type="CITE">Most Linux distributions have released patches. Unfortunately you still need to recompile your own for Appleās Mac OS X<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
<br>
</blockquote>
<blockquote type="CITE">Cheers<br>
<br>
<br>
</blockquote>
<blockquote type="CITE">--<br>
Kush, Nishchal<br>
<a href="mailto:kush@kush.com.fj">kush@kush.com.fj</a><br>
<br>
<br>
<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
</blockquote>
<blockquote type="CITE">On 25 Sep 2014, at 2:40 pm, Alex Samad - Yieldbroker <<a href="mailto:Alex.Samad@yieldbroker.com">Alex.Samad@yieldbroker.com</a>> wrote:<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
<a href="http://www.smh.com.au/it-pro/security-it/shell-shock-bash-bug-labelled-largest-ever-to-hit-the-internet-20140925-10ltx1.html">http://www.smh.com.au/it-pro/security-it/shell-shock-bash-bug-labelled-largest-ever-to-hit-the-internet-20140925-10ltx1.html</a><br>
<br>
<a href="https://www.us-cert.gov/ncas/current-activity/2014/09/24/Bourne-Again-Shell-Bash-Remote-Code-Execution-Vulnerability">https://www.us-cert.gov/ncas/current-activity/2014/09/24/Bourne-Again-Shell-Bash-Remote-Code-Execution-Vulnerability</a><br>
<br>
_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
<br>
</blockquote>
<blockquote type="CITE">Please consider the environment before printing this email. This message should be regarded as confidential. If you have received this email in error please notify the sender and destroy it immediately. Statements of intent shall only
become binding when confirmed in hard copy by an authorised signatory. The contents of this email may relate to dealings with other companies under the control of BAE Systems Applied Intelligence Limited, details of which can be found at http://www.baesystems.com/Businesses/index.htm.
<pre>
_______________________________________________
AusNOG mailing list
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog">http://lists.ausnog.net/mailman/listinfo/ausnog</a>
</pre>
</blockquote>
<br>
<table cellspacing="0" cellpadding="0" width="100%">
<tbody>
<tr>
<td>-- <br>
<img src="cid:1411646856.2276.47.camel@walrus" align="bottom" border="0"><br>
<br>
<br>
GPG Fingerprint: 8BAF 3175 A1C8 BF5F 3631 BEF4 727C 784A 218B 4CE4 <br>
Just remember, wherever you go ........ there you are. </td>
</tr>
</tbody>
</table>
</body>
</html>