Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0110 A vulnerability in GNU bash has been identified in Tenable Appliance 26 September 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Tenable Appliance Operating System: Network Appliance Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-6271 CVE-2014-7169 Member content until: Sunday, October 26 2014 Reference: ESB-2014.1673 ESB-2014.1672 ESB-2014.1671 ESB-2014.1670 ESB-2014.1669 ESB-2014.1668 ESB-2014.1660 ESB-2014.1659 ESB-2014.1657 OVERVIEW A vulnerability in GNU bash has been identified in Tenable Appliance versions 2.4.1, 2.6.1, 2.6.2, 2.8.0, and 2.8.1. [1] IMPACT The vendor has provided the following details regarding this issue: "GNU bash contains a flaw that is triggered when evaluating environment variables passed from another environment. After processing a function definition, bash continues to process trailing strings. Via certain applications, a local or remote attacker may inject shell commands, allowing local privilege escalation or remote command execution depending on the application vector. The Tenable Appliance has been determined to be affected via the DHCP client that is run when configured to use DHCP for network configuration information on any interface. As of this advisory, this is the only known way to provide environment variables that would affect bash." [1] MITIGATION At present no patch is available to correct the issue, however Tenable has provided the following workaround/mitigation: "Tenable has determined a temporary workaround that mitigates both the base issue and attack variants. Until GNU provides a proper patch, Tenable recommends that DHCP temporarily be disabled. This can be done by following these steps: 1. Open the Appliance Web UI and login as an administrator 2. Navigate to the 'Networking' page 3. For any active interface, set 'Use DHCP' to 'No' 4. Configure a static IP address to access the Appliance 5. Unused interfaces should be left 'Disabled'" [1] REFERENCES [1] [R1] GNU bash 'Shellshock' Vulnerability Affects Tenable Appliance http://www.tenable.com/security/tns-2014-07 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVCTnTBLndAQH1ShLAQLBRg/9E/4vfcevTb3sfmUr5zO9bdQE8OhuBj/1 pubLXii62TG6E2OaRCQBWcCdFqnLrlIWcsbR0Nde7jK3X3JTq+mXtslDYugRQmb3 DPpxXlWAjQNLFy2PvAdpDQeZVLu64M0ym/XVCQUs9xQhZJ99IMYrr5mWd5+AwwQI yFTYiataLlAMm+PgR4iY76LX5ZHQ0HDUpZ+/PNg2WtU8xAR2oCwd46jGnL9ZcO6c fISRUjyvCWy7CWeVV0YamH0jLX/C05qYVDlBnFW+vZNElKdI+FHz1RfeEa4nc6Nf xPHG31Q7I/X5k5UhyQxG9W9QPduSy54qNQF6FTtPcMxIe7Zh8fjaqiINTBoSk8H4 yITjTrM85lRNI0/x3waaYJbBY1g8TzcYvXhmgUHmvoHEfrZYoPznquNp6FUT9LnU fnbjhPv541fXToB0JQ+/h+Eh92BSzliT2sniG2oZyN+dWypcgdsqD1lhdO2pxWbE 1rhlP62/7TFowkV5DkiVW6vV9EapI2tcjAccgUtYf655HbpMxUUL4BHBfJRe3xDp L/JYc//TpnIR7uAMDH7lwt8RC2RMwsRmRnKvrSZr8ytpdeSssVaF2F0GrjG0IK5N 0e1WN4c/sf5h+1c9XeWylFpDGEhnrVSEXNsJlct7FjZeeCqzztKDFLdJtMm/BIc8 yt3AMmZyqbA= =3K8v -----END PGP SIGNATURE-----