25 September 2014

The GNU Bourne Again Shell (Bash) is a command line utility widely used in many Unix-based operating systems including Linux and OS X.

Researchers have discovered a critical flaw in Bash which could allow remote code execution by an unauthenticated user. It affects all software that uses Bash and interacts with environmental variables.

Bash has been widely used for more than 20 years. This vulnerability potentially affects an extremely large range of systems, devices and services, many of which are not yet identified. Apache web servers have been identified as affected, but also countless other routers, servers, websites, computers and other devices may be vulnerable.

Due to the potential scale of this issue, it is likely attackers will seek to exploit this vulnerability over coming days.

System administrators are advised that patches have already been released by many of the major Linux vendors. You should consult your vendor for the appropriate patch. (Note that some current patches for this vulnerability do not completely fix the issue, additional patches are expected to be released soon.)

Consumers should ensure software updates are applied to their systems and devices when they become available. It is likely these will be distributed over coming days as affected products are identified and updates released by their manufacturer.

CERT Australia has issued an Advisory about the vulnerability.

The US National Vulnerability Database rates this as severity 10.

More information

RedHat’s security blog provides some early analysis of the vulnerability.

How to set automatic updates on your computer.

The information provided here is of a general nature. Everyone's circumstances are different. If you require specific advice you should contact your local technical support provider.

Feedback

Thank you to those subscribers who have provided feedback to our Alerts and Newsletters. We are very interested in your feedback and where possible take on board your suggestions or requests.

Disclaimer

This information has been prepared by Enex TestLab for the Department of Communications ('the Department'). It was accurate and up to date at the time of publishing.

This information is general information only and is intended for use by private individuals and small to medium sized businesses. If you are concerned about a specific cyber security issue you should seek professional advice.

The Commonwealth, Enex TestLab, and all other persons associated with this advisory accept no liability for any damage, loss or expense incurred as a result of the provision of this information, whether by way of negligence or otherwise.

Nothing in this information (including the listing of a person or organisation or links to other web sites) should be taken as an endorsement of a particular product or service.

Please note that third party views or recommendations included in this information do not reflect the views of the Commonwealth, or indicate its commitment to a particular course of action. The Commonwealth also cannot verify the accuracy of any third party material included in this information.

CONTACT US

Facebook: www.facebook.com/staysmartonline
Email: staysmartonline [at] communications.gov.au
Web: www.staysmartonline.gov.au
You are receiving this message at the address [Email].
Update your profile preferences
If you no longer wish to receive this information, you can unsubscribe.

© 2013 Australian Government. All rights reserved

Connect with Stay Smart Online
  • Facebook.
  • youtube
  • RSS feed