NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
skilke
Sep 25, 2014Aspirant
BASH exploit - Shellshock
Hi I have a ReadyNas Ultra 2 and it has version 3.1.17 of BASH installed which has a High risk vulnerability. Can somebody please explain how to patch BASH so that my system is not at risk from...
mathuin
Sep 25, 2014Aspirant
Skywarp wrote: I've had a look myself, and can confirm the vulnerable bash version, however, I haven't found a way to remotely trigger this.
I.e. you need to have SSH access to the box as far as I can see for now.
I'll await the answer from the devs, to see if they have any more information on this.
If you want to be extra safe/paranoid, indeed disable port forwards to your ReadyNAS.
http://www.troyhunt.com/2014/09/everyth ... about.html
Remote code execution is pretty easy in the general case with this bug because web servers are usually running on bash or bash-derived shells and the CGI spec (http://www.ietf.org/rfc/rfc3875) requires certain information to be exported to the environment -- which under Unix variants is most often done with environment variables. So if you've got the web server port-forwarded and accessible from the outside, you're very likely to be vulnerable.
Jack.
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!