Bash Vulnerability

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts
  • alb293
    Hot Shot
    • Jul 2011
    • 14

    Bash Vulnerability



    It looks like a lot of Avaya servers are vulnerable right now, since CentOS and Redhat are affected.
  • jaytarbox
    Whiz
    • Apr 2010
    • 30

    #2
    And, Avaya hasn't said a word that I can find yet. I had customers asking about it only a few hours after the news broke.
    Last edited by jaytarbox; 09-26-2014, 08:28 AM.

    Comment

    • tkbinpdx
      Member
      • Sep 2014
      • 3

      #3
      Avaya Advisory link for 2014 - nothing posted since 9/23

      Comment

      • rbrookes
        Guru
        .
        • Jan 2012
        • 144

        #4
        Shellshock/Bash impact update for Avaya products
        Avaya’s Product Security Team is aware of the Shellshock security issue and is working aggressively with product teams across our portfolio to assess any possible impact and identify a mitigation plan as appropriate. An Avaya Security Advisory (ASA) will be published later today, Friday 26 September at approximately 7pm ET. The Product Security team will continue to report findings as they become available.

        Please visit the following link on the Avaya Support Website for the latest information on this topic. All ASAs for Shellshock will be posted to this site.

        Avaya Support Website – Shellshock/Bash Impact for Avaya Products - https://support.avaya.com/helpcenter...26131554370002
        Russ Brookes | Avaya, KCS Leader | +1 613.771.7590 | [email protected] | NA Eastern Time Zone

        Comment

        • darrenspain
          Member
          • Oct 2011
          • 4

          #5
          hi
          are avaya telling the customers to wait until they have included updates in patchs / security updates or are avaya telling customers to go ahead and use the updates from the RedHat site ?

          I have read the bulletin from Avaya but it is not clear to me what is the recommended course of action ?

          Thanks
          Darren

          Comment

          • jaytarbox
            Whiz
            • Apr 2010
            • 30

            #6
            You should wait, most of the products you wouldn't have the rights to install the needed patch anyway.

            Comment

            • aa1
              Guru
              .
              • Feb 2010
              • 185

              #7
              Asa-2014-369

              Take a look at this:



              Arbi

              Comment

              • jlm
                Aspiring Member
                • Oct 2014
                • 1

                #8
                Does anyone happen to know if this affects IP phones, and in particular the 9600 series (9608, 9611, etc.) that run a linux kernel?

                I don't see this addressed on the Avaya shellshock info.

                Regards,

                - Joe

                Comment

                • richa164
                  Guru
                  • Oct 2013
                  • 131

                  #9
                  Run this test from linux shell.







                  env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

                  If you get

                  Vulnerable
                  This is a test

                  Well guess what !!

                  Comment

                  • audetd
                    Member
                    • Jun 2010
                    • 7

                    #10
                    Originally posted by richa164 View Post
                    Run this test from linux shell.







                    env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

                    If you get

                    Vulnerable
                    This is a test

                    Well guess what !!


                    and now just checking my LAB's

                    Here is the result for the Communication Manager
                    dadmin@CM-LAB> env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
                    vulnerable
                    this is a test

                    Result for my DOM0
                    [admin@CM2-SPDom0 ~]$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
                    vulnerable
                    this is a test
                    [admin@CM2-SPDom0 ~]$

                    Result for my CDOM0
                    [admin@CM2-SPCdom ~]$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
                    vulnerable
                    this is a test
                    [admin@CM2-SPCdom ~]$


                    So that mean i am Vulnerable.

                    is there an offcial procedure from Avaya to find out.

                    Daniel
                    Last edited by audetd; 10-02-2014, 12:27 PM.
                    _____________________________
                    Daniel
                    Allstream Application Specialist

                    Comment

                    • alb293
                      Hot Shot
                      • Jul 2011
                      • 14

                      #11
                      Yes, if the code above does not return Vulnerable, you are fine.

                      Comment

                      • jaytarbox
                        Whiz
                        • Apr 2010
                        • 30

                        #12
                        Patches out for various CM versions now, no indication if they're service interrupting or not.

                        Comment

                        • audetd
                          Member
                          • Jun 2010
                          • 7

                          #13
                          I have installed the 6.2 patch in my Lab and the script test does not show the Vulnerable word any more.

                          But Platform still show it. so we will need patch later on this one.

                          Here is the link where i got the patch.

                          Last edited by audetd; 10-02-2014, 04:37 PM.
                          _____________________________
                          Daniel
                          Allstream Application Specialist

                          Comment

                          • jaytarbox
                            Whiz
                            • Apr 2010
                            • 30

                            #14
                            Was it service interrupting when you installed it?

                            Comment

                            • audetd
                              Member
                              • Jun 2010
                              • 7

                              #15
                              Originally posted by jaytarbox View Post
                              Patches out for various CM versions now, no indication if they're service interrupting or not.
                              I have install on CM 6.2 Via Platform and this is HOT not service affecting

                              See my screen capture in attachement
                              Attached Files
                              _____________________________
                              Daniel
                              Allstream Application Specialist

                              Comment

                              Loading