Ana içeriğe atla

bash kullanıcılarına (linux/solaris vs.)


Solaris, linux(tüm linux dağıtımları için) kullanıcılarının aşağıdaki yazıyı okuması ve sistemlerini acilen güncellemesi iyi olur.


http://www.oracle.com/technetwork/topics/security/alert-cve-2014-7169-2303276.html


Oracle Security Alert for CVE-2014-7169


Description

This Security Alert addresses CVE-2014-7169 (initially identified as CVE-2014-6271), a publicly disclosed vulnerability affecting GNU Bash. GNU Bash is a popular open source command line shell incorporated into Linux and other widely used operating systems. This vulnerability affects multiple Oracle products. This vulnerability may be remotely exploitable without authentication, i.e. it may be exploited over a network without the need for a username and password. A remote user can exploit this vulnerability to execute arbitrary code on systems that are running affected versions of Bash.
Oracle is still investigating this issue and will provide fixes for affected products as soon as they have been fully tested and determined to provide effective mitigation against the vulnerability.
The fixes that are available for immediate application by customers are listed in the Patch Availability Table. This Security Alert will be updated when fixes are available for additional affected Oracle products without sending additional emails to customers. Customers should check this page for updates.
Due to the severity, public disclosure, and reports of active exploitation of CVE-2014-7169, Oracle strongly recommends that customers apply the fixes provided by this Security Alert as soon as they are released by Oracle.

Oracle products that are affected and have fixes available

Oracle has determined that the following products are affected by this vulnerability, and fixes for these products are available for immediate application by customers. The patch availability information for these affected products is provided in the table below.
Note: Patch availability information is provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers remain on actively supported versions to ensure that they continue to receive security fixes from Oracle.

Patch Availability Table

Affected product Patch Availability and Installation Information
Oracle Linux, versions 4, 5, 6, 7 My Oracle Support Note 1930120.1
Oracle Solaris, versions 8, 9, 10, 11 My Oracle Support Note 1930090.1


Oracle products that are affected and do not have fixes available at this time

Oracle has determined that following Oracle products are vulnerable to CVE-2014-7169 and CVE-2014-6271. Fixes for these products will be distributed as they become available and this Security Alert will be updated to reflect the availability of these fixes in the Patch Availability Table.
  • Big Data Appliance
  • Exadata
  • Exalogic
  • Oracle Audit Vault and Database Firewall
  • Oracle Communications Application Orchestrator - Server Perpetual (version 74M1)
  • Oracle Communications Application Session Controller
  • Oracle Communications Diameter Intelligence Hub
  • Oracle Communications Diameter Signaling Router
  • Oracle Communications Diameter Signaling Router - Full Address Resolution
  • Oracle Communications EAGLE Application Processor
  • Oracle Communications EAGLE Collector Application Processor
  • Oracle Communications EAGLE LNP Application Processor
  • Oracle Communications Interactive Session Recorder
  • Oracle Communications Policy Controller
  • Oracle Communications Policy Management
  • Oracle Communications Service Broker Engineered System Edition 6.0
  • Oracle Communications Session Element Manager
  • Oracle Communications Session Report Manager
  • Oracle Communications Session Route Manager
  • Oracle Communications Subscriber Data Management
  • Oracle Communications User Data Repository
  • Oracle Communications WebRTC Session Controller
  • Oracle Data Appliance
  • Oracle Integrated Lights Out Manager
  • Oracle Key Vault
  • Oracle VM
  • Pillar Axiom 600 Storage System 4, 5
  • SPARC Supercluster
  • Sun ZFS Storage Appliance Kit (AK)
  • Tekelec HLR Router
  • Tekelec Platform Management & Configuration
  • Tekelec Virtual Operating Environment

References

Modification History


Date Comments
2014-September-26 Rev 1. Initial Release


Appendix - Oracle Sun Systems Products Suite

 

Oracle Sun Systems Products Suite Executive Summary

This Security Alert contains 1 new security fix for the Oracle Sun Systems Products Suite.  This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.  The English text form of this Risk Matrix can be found here.

Oracle Sun Systems Products Suite Risk Matrix


CVE# Component Protocol Sub-
component
Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen-
tication
Confiden-
tiality
Integrity Avail-
ability
CVE-2014-7169 Solaris Multiple Bash Yes 10.0 Network Low None Complete Complete Complete 8, 9, 10, 11 See Note 1
Notes:
  1. The CVSS score is taken from
    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169.


Appendix - Oracle Linux and Virtualization

 

Oracle Linux Executive Summary

This Security Alert contains 1 new security fix for Oracle Linux.  This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.  The English text form of this Risk Matrix can be found here.

Oracle Linux Risk Matrix


CVE# Component Protocol Sub-
component
Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen-
tication
Confiden-
tiality
Integrity Avail-
ability
CVE-2014-7169 Oracle Linux Multiple Bash Yes 10.0 Network Low None Complete Complete Complete 4, 5, 6, 7 See Note 1
Notes:
  1. The CVSS score is taken from
    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169.


























Yorumlar

Bu blogdaki popüler yayınlar

ttnet tilgin hg1332 modem(router) kablosuz özelliğini güçlendirmek

Bu gün ttnetin hediyesi olan tilgin yönlendiriciyle biraz oynayayım dedim Matkap, ve rg316-rp-sma kablo alıp cihazın kapağını tekrar açtım. Matkapla usb çıkışın yanına bir delik açarak kaployu taktım. Sonra elimdeki antenlerden ikiti tanesini takıp test ettim. . Bu iki antenin, gözle farkedilir derecede sinyalleri kuvvetlendirdiğini fark ettim.. Normalde bu cihaz ile evin iki en uc noktaları arasında haberleşme olmaz iken şimdi en kör iki uç arasında sorun olmadan kablosuz kullanılabildiğini gördüm. Arada 4 tane kuvvetli beton duvar mevcut. Deneme bitti, tilgin rafa kalktı yine. Her nekadar ben bu cihazı kaldırsamda, kullanmak zorunda olan arkadaşlar, bir kablo ve ikitane anten takarak her herde kullanabilirler. İyi eğlenceler.

docker servisi proxy ayarı

  /etc/systemd/system/docker.service.d/http-proxy.conf   [Service] Environment="HTTP_PROXY= http://10.27.152.40:8080" Environment="HTTPS_PROXY= http://10.27.152.40:8080" # systemctl daemon-reload # systemctl restart docker # systemctl show --property=Environment docker

internet servis sağlayıcıları gerçekten tam bir servis sağlıyor mu?

 Bu ay taşındıktan sonra eski evde kullandığımız süperonline kullanmaya devam edeyim dedim ve bin pişman oldum. Eski evde süperonline dinamek gerçek ip adresi ile hizmet verirken, yeni yerde cgnat-sanal ip adresi ile hizmet vermeye başlamışlar. Sözde biz kullanıcıların menfaite olan bu davranış, aslında biz kullanıcıların zararına, superonline kullanıcı başına aylık ortalama +2$ kar sağlamasına yarıyor. Çünkü gerçek ip adresinin maliyeti ortalama $2 :-) Gerçek dinamik ip adresi vermemeleri, statik ip adresi kullanmaya zorlamalarından dolayı süperonline aboneliğim 15 gün sürdü. 15 Gün sürmesinin nedenide süperonline beni yanıltması, gerçek cevabı geciktirmesi. Çünkü bir hizmet ve ürün alımında ilk 14 gün neden göstermeksizin anlaşmadan vaz geçilebiliyor!!! Kişisel tecrübemle Türkcell Süperonline   dan kesinlikle bir daha hizmet almam, kimseyede tavsiye etmem.  Umarım gelecekte süperonline müşterilerine karşı açık ve net bilgi verir, müşteri odaklı bir şirket olur....