FreeBSD : rt42 -- vulnerabilities related to shellshock (81e2b308-4a6c-11e4-b711-6805ca0b3d42)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Best Practical reports :

RT 4.2.0 and above may be vulnerable to arbitrary execution of code by
way of CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, or
CVE-2014-6271 -- collectively known as 'Shellshock.' This
vulnerability requires a privileged user with access to an RT instance
running with SMIME integration enabled; it applies to both mod_perl
and fastcgi deployments. If you have already taken upgrades to bash to
resolve 'Shellshock,' you are protected from this vulnerability in RT,
and there is no need to apply this patch. This vulnerability has been
assigned CVE-2014-7227.

See also :

http://www.nessus.org/u?42ab1f4e
http://www.nessus.org/u?ed63a741

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 78039 ()

Bugtraq ID:

CVE ID: CVE-2014-6271
CVE-2014-6277
CVE-2014-7169
CVE-2014-7186
CVE-2014-7187

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now