GNU Bash is prone to remote code execution vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic
Implement multiple redundant layers of security.
Various memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker’s ability to exploit this vulnerability to execute arbitrary code.
Run all software as a nonprivileged user with minimal access rights.
To limit the impact of latent vulnerabilities, configure database servers and other applications to run as a nonadministrative user with minimal access rights.
Updates are available. Please see the references or vendor advisory for more information.
googlechromereleases.blogspot.com/2014/10/stable-channel-update-for-chrome-os.html
support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html?ref=rss
www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
www-01.ibm.com/support/docview.wss?uid=ssg1S1004911
www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
www-01.ibm.com/support/docview.wss?uid=ssg1S1004928
www-01.ibm.com/support/docview.wss?uid=swg21686131
www-01.ibm.com/support/docview.wss?uid=swg21686246
www.appneta.com/blog/appneta-response-to-shell-shock-bash-vulnerability/
www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html
www.datalink.com/Datalink/media/Datalink-Media-Library/Charts%20and%20graphs/KB_000192608-Bash-Code-Injection-Vulnerability.pdf
www.fortiguard.com/advisory/FG-IR-14-030/
www.gnu.org/software/bash/
www.huawei.com/en/security/psirt/security-bulletins/security-notices/archive/hw-372538.htm
www.ibm.com/support/docview.wss?uid=isg3T1021361
www.ibm.com/support/docview.wss?uid=ssg1S1004903
www.ibm.com/support/docview.wss?uid=ssg1S1004932
www.ibm.com/support/docview.wss?uid=swg21686433
www.ibm.com/support/docview.wss?uid=swg21686445
www.ibm.com/support/docview.wss?uid=swg21686479
www.ibm.com/support/docview.wss?uid=swg21686494
www.oracle.com/technetwork/topics/security/alert-cve-2014-7169-2303276.html
www.symantec.com/business/support/index?page=content&id=TECH224948
blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash
bugs.mageia.org/show_bug.cgi?id=14167
bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6271
kc.mcafee.com/corporate/index?page=content&id=KB83017
library.netapp.com/ecm/ecm_get_file/ECMP1655016
lists.gnu.org/archive/html/bug-bash/2014-09/msg00081.html
support.apple.com/kb/HT6535
supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673
supportkb.riverbed.com/support/index?page=content&id=S24997
www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_vulnerabilities_in_bash_affect_certain_qlogic_products_that_ibm_resells_for_bladecenter_and_flex_system_products_cve_2014_6271_cve_2014_7169_cve_2014_7186_cve_2014_7187_cve_2014_6277_
www-304.ibm.com/support/docview.wss?uid=isg3T1021284
www.arista.com/en/support/security-advisories/1008-security-advisory-0006