Quantcast
Channel: Bobcares Blog Feed
Viewing all articles
Browse latest Browse all 170

Resolving Bash vulnerability in Parallels Plesk Linux servers : How to fix CVE-2014-6217 Bash "Shell Shock" vulnerability

$
0
0


Highly critical Bash code injection vulnerability CVE-2014-6217 was declared on 24th Sep, and a patch is now available for Parallels Plesk servers.

If you have a Plesk Linux server, it has Bash, and if you haven't expressly patched it, assume that your server is vulnerable to hack. Plesk servers are typically enabled with CGI modules, and they could allow commands to be passed on to Bash, thus opening the gates to hackers.

The engineers in our Proactive Server Management Services detected this threat on 24th, and patched all our Plesk Linux servers with the following steps:

In CentOS / RedHat / CloudLinux servers,

Login to terminal as root and execute the command:

# yum -y update bash

In Ubuntu / Debian servers,

Login to terminal as root and execute the command:

# apt-get update && apt-get install bash

In OpenSuse servers,

Login to terminal as root and execute the command:

# zypper patch --cve=CVE-2014-6217

If you are not comfortable using a root terminal, consult a systems administrator.

This should protect you from the critical CVE-2014-6217 vulnerability, however, your server will need to be patched again to be fully protected once a solution is available for the related CVE-2014-7169 vulnerability. When the patch is available, just execute the above steps again.

[ UPDATE ] - Patch for CVE-2014-7169 is now available. So, in case you have already ran the commands above, re-run them again to get the final patch.

Critical vulnerabilities are a fact of web hosting. Bobcares Proactive Server Management prevents zero-day exploits by configuring servers for managed auto-upgrades.

Not sure if your servers are patched? We can check your servers for FREE, and optionally patch your servers.

Fix my server now!


Viewing all articles
Browse latest Browse all 170

Trending Articles