Document not found! Please try again

Bash Code Injection Vulnerability (ShellShock/BashBug) in ... - Datalink

0 downloads 11 Views 12KB Size Report
Sep 26, 2014 - Advisor (DPA). All. No. DPA does not ship any version of the Linux OS or Bash shell. It ... The default W
Bash Code Injection Vulnerability (ShellShock/BashBug) in EMC products. Article Number:000192608 Version:17 Key Information Audience: Original Create Date: Thu Sep 25 15:54:40 GMT 2014 Article Type: Security KB Channels: First Published: Thu Sep 25 15:56:32 GMT 2014 Validation Status: Technically Approved Originally Created By: Last Modified: Fri Sep 26 16:07:58 GMT 2014 Last Published: Fri Sep 26 16:07:58 GMT 2014 Summary: Bash Code Injection Vulnerability (ShellShock/BashBug) in EMC products. Article Content Summary: GNU Bash 1.140 through 4.3 are indicated to be vulnerable to the ShellShock Vulnerability, also known as the Bash Bug. There are two CVEs associated with this - CVE-2014-6271 and CVE-2014-7169. Due to the way the Bash shell evaluates certain specially crafted environment variables, it is possible for an attacker to override environment restrictions and run arbitrary shell commands.

See the description below from Red Hat (https://access.redhat.com/articles/1200223):

"This issue affects all products which use the Bash shell and parse values of environment variables. This issue is especially dangerous as there are many possible ways Bash can be called by an application. Quite often if an application executes another binary, Bash is invoked to accomplish this. Because of the pervasive use of the Bash shell, this issue is quite serious and should be treated as such." EMC is aware of and investigating this issue to identify the product impact. The level of impact may vary depending on the affected product. The following table contains the latest available impact information. This table will be updated as additional information becomes available.

Product name

Supported Versions

Impacted?

Avamar

Avamar 6.x

Yes

Details

Additional investigation in progress For versions 7.x, investigation is in progress to determine the impact.

Celerra

All

Yes

Additional investigation in progress

Documentum D2

All

No

D2 does not use shell scripts in any way at runtime or during installation

Data Protection Advisor (DPA)

All

No

Kazeon

4.7, 4.8

Yes

Isilon OneFS

All

Limited impact

Supplier Exchange

All

Yes

DPA does not ship any version of the Linux OS or Bash shell. It also does not set environment variables based on user input. Follow OS vendor patching guidelines to patch underlying host. Additional investigation in progress Isilon OneFS is not vulnerable to CGI and DHCP attack vectors. It is vulnerable to SSH attack vector by authenticated cluster user. Further investigation is in progress. Additional investigation in progress

Windows based appliance. The default Windows CMD.exe is used for any shells

Symmetrix, DMX, VMAX All

No

VNX1

All

Yes

VNX Block components are not vulnerable. Additional investigation in progress

VNX2

All

Yes

VNX Block components are not vulnerable. Additional investigation in progress

VNXe

All

Yes

Additional investigation in progress

VNXe 3200

All

Yes

Additional investigation in progress

VPLEX, VPLEX-VE

5.4 or earlier

Yes

Additional investigation in progress

Yes

Additional investigation is in progress

ViPR SRM (vApp Deploys 3.0, 3.0.1, 3.0.2, 3.0.3, 3.5, and 3.5.1 only)

Article Metadata Shared: Yes

launched. BASH is not installed or used.