US-CERT: Bourne Again Shell (Bash) Remote Code Execution Vulnerability

0 views
Skip to first unread message

Gerald309

unread,
Sep 26, 2014, 8:07:56 AM9/26/14
to linux...@googlegroups.com, Linux...@yahoogroups.com, BlueCollar...@yahoogroups.com, bluecollar...@googlegroups.com
Fwd: Bourne Again Shell (Bash) Remote Code Execution Vulnerability


-------- Forwarded Message --------
Subject: Bourne Again Shell (Bash) Remote Code Execution Vulnerability
Date: Wed, 24 Sep 2014 18:17:21 -0500
From: US-CERT <US-...@ncas.us-cert.gov>
Reply-To: US-...@ncas.us-cert.gov
To: gera...@gmail.com


NCCIC / US-CERT

National Cyber Awareness System:

09/24/2014 06:06 PM EDT

Original release date: September 24, 2014

US-CERT is aware of a Bash vulnerability affecting Unix-based operating systems such as Linux and Mac OS X. Exploitation of this vulnerability may allow a remote attacker to execute arbitrary code on an affected system.
 
US-CERT recommends users and administrators review the Redhat Security Blog for additional details and to refer to their respective Linux or Unix-based OS vendor(s) for an appropriate patch. A GNU Bash patch is also available for experienced users and administrators to implement.

Operating systems with updates include:


This product is provided subject to this Notification and this Privacy & Use policy.


OTHER RESOURCES:
Contact Us | Security Publications | Alerts and Tips | Related Resources
STAY CONNECTED:
Sign up for email updates

This email was sent to gera...@gmail.com using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (703) 235-5110 Powered by GovDelivery


Reply all
Reply to author
Forward
0 new messages