![]() ![]() |
#1
|
|||
|
|||
![]()
http://arstechnica.com/security/2014...ith-nix-in-it/
It looks like a lot of Avaya servers are vulnerable right now, since CentOS and Redhat are affected. |
#2
|
|||
|
|||
![]()
And, Avaya hasn't said a word that I can find yet. I had customers asking about it only a few hours after the news broke.
Last edited by jaytarbox; 09-26-2014 at 08:28 AM. |
#3
|
|||
|
|||
![]() |
#4
|
||||
|
||||
![]()
Shellshock/Bash impact update for Avaya products
Avaya’s Product Security Team is aware of the Shellshock security issue and is working aggressively with product teams across our portfolio to assess any possible impact and identify a mitigation plan as appropriate. An Avaya Security Advisory (ASA) will be published later today, Friday 26 September at approximately 7pm ET. The Product Security team will continue to report findings as they become available. Please visit the following link on the Avaya Support Website for the latest information on this topic. All ASAs for Shellshock will be posted to this site. Avaya Support Website – Shellshock/Bash Impact for Avaya Products - https://support.avaya.com/helpcenter...26131554370002
__________________
Russ Brookes | Avaya, KCS Leader | +1 613.771.7590 | rbrookes@avaya.com | NA Eastern Time Zone |
#5
|
|||
|
|||
![]()
hi
are avaya telling the customers to wait until they have included updates in patchs / security updates or are avaya telling customers to go ahead and use the updates from the RedHat site ? I have read the bulletin from Avaya but it is not clear to me what is the recommended course of action ? Thanks Darren |
#6
|
|||
|
|||
![]()
You should wait, most of the products you wouldn't have the rights to install the needed patch anyway.
|
#7
|
|||
|
|||
![]() |
#8
|
|||
|
|||
![]()
Does anyone happen to know if this affects IP phones, and in particular the 9600 series (9608, 9611, etc.) that run a linux kernel?
I don't see this addressed on the Avaya shellshock info. Regards, - Joe |
#9
|
|||
|
|||
![]()
Run this test from linux shell.
env x='() { :;}; echo vulnerable' bash -c "echo this is a test" If you get Vulnerable This is a test Well guess what !! |
#10
|
||||
|
||||
![]() Quote:
and now just checking my LAB's Here is the result for the Communication Manager dadmin@CM-LAB> env x='() { :;}; echo vulnerable' bash -c "echo this is a test" vulnerable this is a test Result for my DOM0 [admin@CM2-SPDom0 ~]$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test" vulnerable this is a test [admin@CM2-SPDom0 ~]$ Result for my CDOM0 [admin@CM2-SPCdom ~]$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test" vulnerable this is a test [admin@CM2-SPCdom ~]$ So that mean i am Vulnerable. is there an offcial procedure from Avaya to find out. Daniel
__________________
_____________________________ Daniel Allstream Application Specialist Last edited by audetd; 10-02-2014 at 12:27 PM. |
![]() |
Tags |
bugs, linux, security, security advisories, vulnerability |
Thread Tools | Search this Thread |
Display Modes | |
|
|