Red Hat在Bash Shell中发现了一个名为Bash Bug的安全漏洞,当用户正常访问时,该漏洞允许攻击者的代码像在Shell中一样执行,这样就为各种各样的攻击打开了方便之门。据悉,其严重性要超过之前的“心脏出血”漏洞。
检测方法
$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
如果返回以下内容:则请尽快升级。
[oracle@oracle10g-dg2-213-101 ~]$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test
vulnerable
this is a test
修复方法如下:
RHEL 5修复方法
64位
wget http://mirrors.aliyun.com/centos/5/updates/x86_64/RPMS/bash-3.2-33.el5.1.x86_64.rpm && rpm -Uvh bash-3.2-33.el5.1.x86_64.rpm
32位
wget http://mirrors.aliyun.com/centos/5/updates/i386/RPMS/bash-3.2-33.el5.1.i386.rpm && rpm -Uvh bash-3.2-33.el5.1.i386.rpm
CENTOS 6修复方法
yum -y update bash
其他版本修复可参照
http://www.1987.name/166.html
修复完成之后
[root@oracle10g-dg2-213-101 ~]# env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
You have new mail in /var/spool/mail/root
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
You have new mail in /var/spool/mail/root