Shellshock

Protect your Systems Against the Shellshock Bash Vulnerability

For those who may not be aware, its been announced last week (September 24, 2014) to be precise, of the discovery of a GNU Bash vulnerability, referred to as Shellshock. Shellshock exploit enables a remote attacker to gain control of systems remotely and execute arbitrary code via a crafted environment. The impact of this vulnerability is it Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service. The following environments have been identified to be affected OpenSSH sshd The mod_cgi and mod_cgid modules in the Apache HTTP Server Scripts executed by unspecified DHCP clients [box type=”danger” icon=”warning”]Detailed description of this vulnerability can be foundĀ on Red Hat website[/box] Is my system Vulnerability?