Protect your Systems Against the Shellshock Bash Vulnerability

For those who may not be aware, its been announced last week (September 24, 2014) to be precise, of the discovery of a GNU Bash vulnerability, referred to as Shellshock. Shellshock exploit enables a remote attacker to gain control of systems remotely and execute arbitrary code via a crafted environment. The impact of this vulnerability is it Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service. The following environments have been identified to be affected OpenSSH sshd The mod_cgi and mod_cgid modules in the Apache HTTP Server Scripts executed by unspecified DHCP clients [box type=”danger” icon=”warning”]Detailed description of this vulnerability can be foundĀ on Red Hat website[/box] Is my system Vulnerability?