{"id":2575,"date":"2014-09-29T09:16:10","date_gmt":"2014-09-29T09:16:10","guid":{"rendered":"http:\/\/www.24x7serversupport.com\/24x7serversupport-blog\/?p=31"},"modified":"2023-01-24T12:00:45","modified_gmt":"2023-01-24T06:30:45","slug":"cve-2014-7169-bash-shell-shock-vulnerability-linux","status":"publish","type":"post","link":"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/","title":{"rendered":"CVE-2014-7169 BASH Shell Shock Vulnerability for Linux"},"content":{"rendered":"<h2>What is CVE-2014-7169 \/ Shell Shock Vulnerability?<\/h2>\n<p>GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.<br \/>\nNOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.<br \/>\nIn short Shell Shock vulnerability allows remote attackers to execute arbitrary code given certain conditions, by passing strings of code following environment variable assignments.<br \/>\nThe Shell Shock vulnerability is considered bigger than Heartbleed as it\u2019s affecting all versions of bash and it\u2019s still unclear from when and adding to that linux bash is not only running on linux webservers but other embedded devices as well such as Mac Laptops<\/p>\n<p><strong>Check if your server is affected<\/strong><\/p>\n<blockquote><p>root@server[#] env x='() { :;}; echo vulnerable\u2019 bash -c \u201cecho this is a test\u201d<br \/>\nbash: warning: x: ignoring function definition attempt<br \/>\nbash: error importing function definition for`x\u2019<br \/>\nthis is a test<\/p><\/blockquote>\n<p><strong>If you get the above output then you are safe.&nbsp;But, &nbsp;if you get the below output then you are affected.<\/strong><\/p>\n<blockquote><p>root@server[#] env x='() { :;}; echo vulnerable\u2019 bash -c \u201cecho this is a test\u201d<br \/>\nvulnerable<br \/>\nthis is a test<\/p><\/blockquote>\n<p><strong>To fix it follow below steps:<\/strong><\/p>\n<p>For RedHat\/CentOS\/Fedora\/RPM based OS:<\/p>\n<p>Note:: This is a temporary fix released by Red Hat Security Team. The team is still working on a full fix which is expected to release soon.<\/p>\n<blockquote><p>root@server[#] yum upgrade bash<\/p><\/blockquote>\n<p>For&nbsp;Ubuntu \/ Debian<\/p>\n<blockquote><p>apt-get update &amp;&amp; sudo apt-get install \u2013only-upgrade bash<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is CVE-2014-7169 \/ Shell Shock Vulnerability? GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3529,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[30],"tags":[31,32],"class_list":["post-2575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-centos","tag-centos","tag-cpanel"],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2014-7169 BASH Shell Shock Vulnerability for Linux \u2013 24x7serversupport-Blog<\/title>\n<meta name=\"description\" content=\"GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2014-7169 BASH Shell Shock Vulnerability for Linux \u2013 24x7serversupport-Blog\" \/>\n<meta property=\"og:description\" content=\"GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"24x7serversupport Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-29T09:16:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-24T06:30:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2014\/09\/1200px-Shellshock-bug.svg_.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1279\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"24x7support\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@24x7serversuppo\" \/>\n<meta name=\"twitter:site\" content=\"@24x7serversuppo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"24x7support\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/\",\"url\":\"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/\",\"name\":\"CVE-2014-7169 BASH Shell Shock Vulnerability for Linux \u2013 24x7serversupport-Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2014\/09\/1200px-Shellshock-bug.svg_.png?fit=1200%2C1279&ssl=1\",\"datePublished\":\"2014-09-29T09:16:10+00:00\",\"dateModified\":\"2023-01-24T06:30:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401\"},\"description\":\"GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2014\/09\/1200px-Shellshock-bug.svg_.png?fit=1200%2C1279&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2014\/09\/1200px-Shellshock-bug.svg_.png?fit=1200%2C1279&ssl=1\",\"width\":1200,\"height\":1279,\"caption\":\"CVE-2014-7169 BASH Shell Shock Vulnerability for Linux\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.24x7serversupport.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2014-7169 BASH Shell Shock Vulnerability for Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#website\",\"url\":\"https:\/\/www.24x7serversupport.com\/blog\/\",\"name\":\"24x7serversupport Blog\",\"description\":\"Linux | CPanel | WHM | webhosting| Plesk | DirectAdmin | CentOs | Debian | Ubuntu Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.24x7serversupport.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401\",\"name\":\"24x7support\",\"url\":\"https:\/\/www.24x7serversupport.com\/blog\/author\/24x7support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2014-7169 BASH Shell Shock Vulnerability for Linux \u2013 24x7serversupport-Blog","description":"GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/","og_locale":"en_US","og_type":"article","og_title":"CVE-2014-7169 BASH Shell Shock Vulnerability for Linux \u2013 24x7serversupport-Blog","og_description":"GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact.","og_url":"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/","og_site_name":"24x7serversupport Blog","article_published_time":"2014-09-29T09:16:10+00:00","article_modified_time":"2023-01-24T06:30:45+00:00","og_image":[{"width":1200,"height":1279,"url":"https:\/\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2014\/09\/1200px-Shellshock-bug.svg_.png","type":"image\/png"}],"author":"24x7support","twitter_card":"summary_large_image","twitter_creator":"@24x7serversuppo","twitter_site":"@24x7serversuppo","twitter_misc":{"Written by":"24x7support","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/","url":"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/","name":"CVE-2014-7169 BASH Shell Shock Vulnerability for Linux \u2013 24x7serversupport-Blog","isPartOf":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2014\/09\/1200px-Shellshock-bug.svg_.png?fit=1200%2C1279&ssl=1","datePublished":"2014-09-29T09:16:10+00:00","dateModified":"2023-01-24T06:30:45+00:00","author":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401"},"description":"GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact.","breadcrumb":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/#primaryimage","url":"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2014\/09\/1200px-Shellshock-bug.svg_.png?fit=1200%2C1279&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2014\/09\/1200px-Shellshock-bug.svg_.png?fit=1200%2C1279&ssl=1","width":1200,"height":1279,"caption":"CVE-2014-7169 BASH Shell Shock Vulnerability for Linux"},{"@type":"BreadcrumbList","@id":"https:\/\/www.24x7serversupport.com\/blog\/cve-2014-7169-bash-shell-shock-vulnerability-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.24x7serversupport.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CVE-2014-7169 BASH Shell Shock Vulnerability for Linux"}]},{"@type":"WebSite","@id":"https:\/\/www.24x7serversupport.com\/blog\/#website","url":"https:\/\/www.24x7serversupport.com\/blog\/","name":"24x7serversupport Blog","description":"Linux | CPanel | WHM | webhosting| Plesk | DirectAdmin | CentOs | Debian | Ubuntu Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.24x7serversupport.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401","name":"24x7support","url":"https:\/\/www.24x7serversupport.com\/blog\/author\/24x7support\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2014\/09\/1200px-Shellshock-bug.svg_.png?fit=1200%2C1279&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts\/2575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/comments?post=2575"}],"version-history":[{"count":1,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts\/2575\/revisions"}],"predecessor-version":[{"id":3530,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts\/2575\/revisions\/3530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/media\/3529"}],"wp:attachment":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/media?parent=2575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/categories?post=2575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/tags?post=2575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}