Fwd: SANS FLASH REPORT: The Shellshock vulnerability: What you should do now.
Drexx Laggui [personal] <drexxl@...
2014-09-26 04:44:48 GMT
26Sep2014 (UTC +8)
I presume most of you have heard the news about Shellshock already.
Here are more actionable information about the issue.
Some are saying it's as big as a problem as Heartbleed, but my gut
feeling disagrees. I maybe wrong though.
-----BEGIN PGP SIGNED MESSAGE-----
SANS FLASH REPORT: The Shellshock vulnerability: What you should do now.
September 25, 2014
Shellshock merits this FLASH report because it is so widespread and so
easy to exploit on systems like your firewalls and web servers and
other similarly important servers running LINUX.
Johannes Ullrich, Director of SANS Internet Storm Center just updated
a brief webcast to provide authoritative answers to the five questions
we are being asked:
1. How important is Shellshock (which specific types of systems can
actually be exploited now)?
2. What is the primary way that this vulnerability is being exploited?
3. What went wrong? Where did the vulnerability come from?
4. How can you find out which of your systems are vulnerable? and How
easy it is for attackers to find the vulnerable systems on your
5. How can you protect yourself?
You can see the slides and listen to his briefing at:
Storm Center has also posted a FAQ which is being updated as new data is found:
Alan Paller, Director of Research, SANS institute
Drexx Laggui -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA
http://www.laggui.com ( Manila & California )
Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer
PGP fingerprint = 0117 15C5 F3B1 6564 59EA 6013 1308 9A66 41A2 3F9B
Philippine Linux Users' Group (PLUG) Mailing List
Searchable Archives: http://archives.free.net.ph