SlideShare a Scribd company logo
Radware Emergency Response Team
Threat Alert: Shellshock
CVE-2014-6271, CVE-2014-7169
Version 1.0.0 Rev. 1
September 26, 2014
Threat Alert | Shellshock
Table of Contents
Background ....................................................................................................................................3
Risk.................................................................................................................................................3
Mitigation Options............................................................................................................................3
	 IPS Signatures..............................................................................................................................3
	 Radware ERT Recommendations..................................................................................................4
Vendor Information...........................................................................................................................4
Additional Information......................................................................................................................4
Contact Information.........................................................................................................................5
Threat Alert | Shellshock
Background
Two new vulnerabilities were recently found in Bash (CVE-2014-6271, CVE-2014-7169). These
vulnerabilities potentially affect certain services and applications and allow remote unauthenticated
attackers to exploit this issue and use this flaw to override or bypass environment restrictions.
This issue affects all products that use Bash and parse values of environment variables. The vulnerable
Bash versions are:
1.14.0, 1.14.1, 1.14.2, 1.14.3, 1.14.4, 1.14.5, 1.14.6, 1.14.7, 2.0, 2.01, 2.01.1, 2.02, 2.02.1, 2.03,
2.04, 2.05, 2.05:b, 3.0, 3.0.16, 3.1, 3.2, 3.2.48, 4.0, 4.0:rc1, 4.1, 4.2, 4.3
Risk
The vulnerabilities potentially affect certain services and applications and allow remote unauthenticated
attackers to inject certain characters into other environments, allowing them to exploit this issue and
use this flaw to override or bypass environment restrictions to execute shell commands. Under certain
conditions, attackers can also provide specially-crafted environment variables containing arbitrary
commands that will be executed on vulnerable systems.
This issue affects products using vulnerable version as detailed in the background paragraph.
Mitigation Options
IPS Signatures
Radware Emergency Response Team (ERT) has produced two IPS signatures for the above
vulnerabilities.
The following commands will implement the signatures in ‘Report Only’ mode in DefensePro:
1.The first signature blocks the pattern "() {" in a request URI therefore will not allow the exploit of the
	 vulnerability to be passed via an HTTP request URI. The "()" is the end of "function_name()" while the
	 " {" is the extra code that is added to the end of the function:
	 dp signatures-protection filter basic-filters user create ERT-bash2-CVE-2014-6271 -p tcp
	 -c x28x29x20x7b -ct
	 "Normalized URL" -ce "Case Sensitive" -dp http
	 dp signatures-protection filter advanced-filters user create group_ERT-bash2-CVE-2014-6271
	 ERT-bash2-CVE-2014-6271
	 dp signatures-protection attacks user create 0 -n ERT-bash2-CVE-2014-6271 -f group_ERT-
	 bash2-CVE-2014-6271 -am 0
	 dp update-policies set 1
Threat Alert | Shellshock
2. The second signature blocks the pattern “() { :;};” which was found to be used in many exploits.
	 dp signatures-protection filter basic-filters user create ERT-bash3-CVE-2014-6271 -p tcp -c
	 x28x29x20x7bx20x3ax3bx7dx3b -ct Text -ce "Case Sensitive" -dp http
	 dp signatures-protection filter advanced-filters user create group_ERT-bash3-CVE-2014-6271
	 ERT-bash3-CVE-2014-6271
	 dp signatures-protection attacks user create 0 -n ERT-bash3-CVE-2014-6271 -f group_ERT-
	 bash3-CVE-2014-6271 -am 0
	 dp update-policies set 1
Radware ERT Recommendations
•	Copy and paste both signature commands into DefensePro CLI and assign them to a protection
	 policy. The signature will be implemented in ‘Report Only’ mode
•	Carefully inspect false positive rates of the signatures and gain confidence such patterns do not
	 appear normally in your environment before chaning it to ‘Block and Report’ mode
•	Radware’s recommendation is to patch the vulnerable systems according to instructions provided by
	 the vendor
Radware ERT and SOC will continue monitoring for new exploits and will release additional protections
as needed.
Vendor Information
•	https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variablescode-
	injection-attack/
Additional Information
References:
•	https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271
•	https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR
WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE.
YOUR USE OF THE INFORMATION IN THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. RADWARE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY
TIME. RADWARE EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.
ERT Attack Report
Shellshock Vulnerability Bash – September 2014
Contact Information
Radware, Inc. - North America Headquarters
Lobby 1 (Visitors) and Lobby 2 (Deliveries)
575 Corporate Drive
Mahwah, NJ 07430
Tel: +1 (201) 512-9771
Toll Free: +1 (888) 234-5763
Fax: +1 (201) 512-9774
Email: info@radware.com
International Headquarters
Radware Ltd.
22 Raoul Wallenberg Street
Tel Aviv 69710, Israel
Tel: 972-3-766 8666
Fax: 972-3-766-8655
Email: info_il@radware.com
For Radware complete offices and locations please visit: http://www.radware.com/Company/Locations.aspx
© 2014 Radware, Ltd. All Rights Reserved. Radware and all other Radware product and service names are registered trademarks of Radware in the U.S. and other
countries. All other trademarks and names are the property of their respective owners. Printed in the U.S.A.

More Related Content

What's hot

IstSec'14 - Onur ALANBEL - ShellShock
IstSec'14 - Onur ALANBEL - ShellShockIstSec'14 - Onur ALANBEL - ShellShock
IstSec'14 - Onur ALANBEL - ShellShock
BGA Cyber Security
 
На страже ваших денег и данных
На страже ваших денег и данныхНа страже ваших денег и данных
На страже ваших денег и данных
Positive Hack Days
 
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and ResultsSecurity Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
Igor Beliaiev
 
Waf bypassing Techniques
Waf bypassing TechniquesWaf bypassing Techniques
Waf bypassing Techniques
Avinash Thapa
 
Hardening Enterprise Apache
Hardening Enterprise ApacheHardening Enterprise Apache
Hardening Enterprise Apacheguestd9aa5
 
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Belgium 2019
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Belgium 201910 Excellent Ways to Secure Your Spring Boot Application - Devoxx Belgium 2019
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Belgium 2019
Matt Raible
 
Bounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC editionBounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC edition
Sandro Gauci
 

What's hot (7)

IstSec'14 - Onur ALANBEL - ShellShock
IstSec'14 - Onur ALANBEL - ShellShockIstSec'14 - Onur ALANBEL - ShellShock
IstSec'14 - Onur ALANBEL - ShellShock
 
На страже ваших денег и данных
На страже ваших денег и данныхНа страже ваших денег и данных
На страже ваших денег и данных
 
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and ResultsSecurity Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
 
Waf bypassing Techniques
Waf bypassing TechniquesWaf bypassing Techniques
Waf bypassing Techniques
 
Hardening Enterprise Apache
Hardening Enterprise ApacheHardening Enterprise Apache
Hardening Enterprise Apache
 
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Belgium 2019
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Belgium 201910 Excellent Ways to Secure Your Spring Boot Application - Devoxx Belgium 2019
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Belgium 2019
 
Bounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC editionBounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC edition
 

Viewers also liked

The New Incumbents: Anti-trust in the Digital Economy
The New Incumbents: Anti-trust in the Digital EconomyThe New Incumbents: Anti-trust in the Digital Economy
The New Incumbents: Anti-trust in the Digital Economy
Camille Mendler
 
Competencias TIC
Competencias TICCompetencias TIC
Competencias TIC
Psiconet_
 
Geld verdienen mit dem effizienten Management von Kundenbeziehungen
Geld verdienen mit dem effizienten Management von KundenbeziehungenGeld verdienen mit dem effizienten Management von Kundenbeziehungen
Geld verdienen mit dem effizienten Management von Kundenbeziehungen
eEvolution GmbH & Co. KG
 
Social interaction in 10 years oscar perez
Social interaction in 10 years oscar perezSocial interaction in 10 years oscar perez
Social interaction in 10 years oscar perez
duncan03
 
Mobbing referencias 10 10
Mobbing referencias 10   10Mobbing referencias 10   10
Mobbing referencias 10 10
Kevin Untiveros Diaz
 
Beneficios del masaje infantil
Beneficios del masaje infantilBeneficios del masaje infantil
Beneficios del masaje infantilelisasa86
 
DevReach: INETA - Voice of the .NET Community!
DevReach: INETA - Voice of the .NET Community!DevReach: INETA - Voice of the .NET Community!
DevReach: INETA - Voice of the .NET Community!
Tomislav Bronzin
 
Vastag Csaba - Conecto - Jegyek
Vastag Csaba - Conecto - JegyekVastag Csaba - Conecto - Jegyek
Vastag Csaba - Conecto - JegyekVictor Maczkó
 
Presentació verallia març 2014
Presentació verallia març 2014Presentació verallia març 2014
Presentació verallia març 2014Enolegs
 
EIB: Stimulating Investment in water innovation
EIB: Stimulating Investment in water innovationEIB: Stimulating Investment in water innovation
EIB: Stimulating Investment in water innovation
EIP Water
 
SRM General instructions for teachers
SRM General instructions for teachersSRM General instructions for teachers
SRM General instructions for teachers
Alex Amundaray
 
Entrevista a Almudena Castro-Girona (Directora de Fundación Aequitas)
Entrevista a Almudena Castro-Girona (Directora de Fundación Aequitas)Entrevista a Almudena Castro-Girona (Directora de Fundación Aequitas)
Entrevista a Almudena Castro-Girona (Directora de Fundación Aequitas)Jaime Barbero Bajo
 
le marketing de la santé
le marketing de la santéle marketing de la santé
le marketing de la santé
Anis Mzoughi
 
What is an Effective Layout?
What is an Effective Layout?What is an Effective Layout?
What is an Effective Layout?
guesta833470
 
Kurs Social Media für Jugendorganisationen - Basics
Kurs Social Media für Jugendorganisationen - BasicsKurs Social Media für Jugendorganisationen - Basics
Kurs Social Media für Jugendorganisationen - Basics
SAJV CSAJ FSAG
 
Oviedo mco nolineales
Oviedo mco nolinealesOviedo mco nolineales
Oviedo mco nolineales
Nahir Antezana
 
Echandoa pederdercap1
Echandoa pederdercap1Echandoa pederdercap1
Echandoa pederdercap1castorDagg
 
Prove Your Value
Prove Your ValueProve Your Value
Prove Your Value
Dana DiTomaso
 
Visi logic getting-started
Visi logic   getting-startedVisi logic   getting-started
Visi logic getting-started
Aditya Eka
 
Discovery | Los Mejores Chefs Predicen las Tendencias Gastronómicas del 2015
Discovery | Los Mejores Chefs Predicen las Tendencias Gastronómicas del 2015Discovery | Los Mejores Chefs Predicen las Tendencias Gastronómicas del 2015
Discovery | Los Mejores Chefs Predicen las Tendencias Gastronómicas del 2015
Grupo Educativo Discovery
 

Viewers also liked (20)

The New Incumbents: Anti-trust in the Digital Economy
The New Incumbents: Anti-trust in the Digital EconomyThe New Incumbents: Anti-trust in the Digital Economy
The New Incumbents: Anti-trust in the Digital Economy
 
Competencias TIC
Competencias TICCompetencias TIC
Competencias TIC
 
Geld verdienen mit dem effizienten Management von Kundenbeziehungen
Geld verdienen mit dem effizienten Management von KundenbeziehungenGeld verdienen mit dem effizienten Management von Kundenbeziehungen
Geld verdienen mit dem effizienten Management von Kundenbeziehungen
 
Social interaction in 10 years oscar perez
Social interaction in 10 years oscar perezSocial interaction in 10 years oscar perez
Social interaction in 10 years oscar perez
 
Mobbing referencias 10 10
Mobbing referencias 10   10Mobbing referencias 10   10
Mobbing referencias 10 10
 
Beneficios del masaje infantil
Beneficios del masaje infantilBeneficios del masaje infantil
Beneficios del masaje infantil
 
DevReach: INETA - Voice of the .NET Community!
DevReach: INETA - Voice of the .NET Community!DevReach: INETA - Voice of the .NET Community!
DevReach: INETA - Voice of the .NET Community!
 
Vastag Csaba - Conecto - Jegyek
Vastag Csaba - Conecto - JegyekVastag Csaba - Conecto - Jegyek
Vastag Csaba - Conecto - Jegyek
 
Presentació verallia març 2014
Presentació verallia març 2014Presentació verallia març 2014
Presentació verallia març 2014
 
EIB: Stimulating Investment in water innovation
EIB: Stimulating Investment in water innovationEIB: Stimulating Investment in water innovation
EIB: Stimulating Investment in water innovation
 
SRM General instructions for teachers
SRM General instructions for teachersSRM General instructions for teachers
SRM General instructions for teachers
 
Entrevista a Almudena Castro-Girona (Directora de Fundación Aequitas)
Entrevista a Almudena Castro-Girona (Directora de Fundación Aequitas)Entrevista a Almudena Castro-Girona (Directora de Fundación Aequitas)
Entrevista a Almudena Castro-Girona (Directora de Fundación Aequitas)
 
le marketing de la santé
le marketing de la santéle marketing de la santé
le marketing de la santé
 
What is an Effective Layout?
What is an Effective Layout?What is an Effective Layout?
What is an Effective Layout?
 
Kurs Social Media für Jugendorganisationen - Basics
Kurs Social Media für Jugendorganisationen - BasicsKurs Social Media für Jugendorganisationen - Basics
Kurs Social Media für Jugendorganisationen - Basics
 
Oviedo mco nolineales
Oviedo mco nolinealesOviedo mco nolineales
Oviedo mco nolineales
 
Echandoa pederdercap1
Echandoa pederdercap1Echandoa pederdercap1
Echandoa pederdercap1
 
Prove Your Value
Prove Your ValueProve Your Value
Prove Your Value
 
Visi logic getting-started
Visi logic   getting-startedVisi logic   getting-started
Visi logic getting-started
 
Discovery | Los Mejores Chefs Predicen las Tendencias Gastronómicas del 2015
Discovery | Los Mejores Chefs Predicen las Tendencias Gastronómicas del 2015Discovery | Los Mejores Chefs Predicen las Tendencias Gastronómicas del 2015
Discovery | Los Mejores Chefs Predicen las Tendencias Gastronómicas del 2015
 

Similar to Radware ERT Threat Alert: Shellshock Bash

Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!
Michael Man
 
logicaltrust-report-opnsense-1.0.pdf
logicaltrust-report-opnsense-1.0.pdflogicaltrust-report-opnsense-1.0.pdf
logicaltrust-report-opnsense-1.0.pdf
nattamailru
 
ESM Service Layer Developers Guide for ESM 6.8c
ESM Service Layer Developers Guide for ESM 6.8cESM Service Layer Developers Guide for ESM 6.8c
ESM Service Layer Developers Guide for ESM 6.8c
Protect724gopi
 
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора OracleДоступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Timur Bagirov
 
Esm rel notes_6.0cp3
Esm rel notes_6.0cp3Esm rel notes_6.0cp3
Esm rel notes_6.0cp3
Protect724v3
 
Forwarding Connector Configuration Guide 7.0.7.7286
Forwarding Connector Configuration Guide 7.0.7.7286Forwarding Connector Configuration Guide 7.0.7.7286
Forwarding Connector Configuration Guide 7.0.7.7286
Protect724gopi
 
Penetration testing by Burpsuite
Penetration testing by  BurpsuitePenetration testing by  Burpsuite
Penetration testing by Burpsuite
AyonDebnathCertified
 
Schneider Electric Security Notification Security Notification -Embedded Web ...
Schneider Electric Security Notification Security Notification -Embedded Web ...Schneider Electric Security Notification Security Notification -Embedded Web ...
Schneider Electric Security Notification Security Notification -Embedded Web ...
Ismail Tasdelen
 
513323774-VMDR-Lab-Tutorial-Supplement-V2.pdf
513323774-VMDR-Lab-Tutorial-Supplement-V2.pdf513323774-VMDR-Lab-Tutorial-Supplement-V2.pdf
513323774-VMDR-Lab-Tutorial-Supplement-V2.pdf
HarkeemShaw1
 
OSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ InfosectrainOSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ Infosectrain
InfosecTrain
 
Esm rel notes_6.0cp2
Esm rel notes_6.0cp2Esm rel notes_6.0cp2
Esm rel notes_6.0cp2
Protect724v3
 
A Developer’s Guide to Kubernetes Security
A Developer’s Guide to Kubernetes SecurityA Developer’s Guide to Kubernetes Security
A Developer’s Guide to Kubernetes Security
Gene Gotimer
 
CRA - overview of vulnerability handling
CRA - overview of vulnerability handlingCRA - overview of vulnerability handling
CRA - overview of vulnerability handling
Olle E Johansson
 
Testing Terraform
Testing TerraformTesting Terraform
Testing Terraform
Nathen Harvey
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
ENGS4851_Final_Certified_Report
ENGS4851_Final_Certified_ReportENGS4851_Final_Certified_Report
ENGS4851_Final_Certified_ReportNagendra Posani
 
ArcSight Express 4.0 Patch 1 release notes
ArcSight Express 4.0 Patch 1 release notesArcSight Express 4.0 Patch 1 release notes
ArcSight Express 4.0 Patch 1 release notes
Protect724v2
 
AWS Study Group - Chapter 03 - Elasticity and Scalability Concepts [Solution ...
AWS Study Group - Chapter 03 - Elasticity and Scalability Concepts [Solution ...AWS Study Group - Chapter 03 - Elasticity and Scalability Concepts [Solution ...
AWS Study Group - Chapter 03 - Elasticity and Scalability Concepts [Solution ...
QCloudMentor
 

Similar to Radware ERT Threat Alert: Shellshock Bash (20)

Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!
 
logicaltrust-report-opnsense-1.0.pdf
logicaltrust-report-opnsense-1.0.pdflogicaltrust-report-opnsense-1.0.pdf
logicaltrust-report-opnsense-1.0.pdf
 
ESM Service Layer Developers Guide for ESM 6.8c
ESM Service Layer Developers Guide for ESM 6.8cESM Service Layer Developers Guide for ESM 6.8c
ESM Service Layer Developers Guide for ESM 6.8c
 
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора OracleДоступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
 
security report
security reportsecurity report
security report
 
Esm rel notes_6.0cp3
Esm rel notes_6.0cp3Esm rel notes_6.0cp3
Esm rel notes_6.0cp3
 
Web Security - CSP & Web Cryptography
Web Security - CSP & Web CryptographyWeb Security - CSP & Web Cryptography
Web Security - CSP & Web Cryptography
 
Forwarding Connector Configuration Guide 7.0.7.7286
Forwarding Connector Configuration Guide 7.0.7.7286Forwarding Connector Configuration Guide 7.0.7.7286
Forwarding Connector Configuration Guide 7.0.7.7286
 
Penetration testing by Burpsuite
Penetration testing by  BurpsuitePenetration testing by  Burpsuite
Penetration testing by Burpsuite
 
Schneider Electric Security Notification Security Notification -Embedded Web ...
Schneider Electric Security Notification Security Notification -Embedded Web ...Schneider Electric Security Notification Security Notification -Embedded Web ...
Schneider Electric Security Notification Security Notification -Embedded Web ...
 
513323774-VMDR-Lab-Tutorial-Supplement-V2.pdf
513323774-VMDR-Lab-Tutorial-Supplement-V2.pdf513323774-VMDR-Lab-Tutorial-Supplement-V2.pdf
513323774-VMDR-Lab-Tutorial-Supplement-V2.pdf
 
OSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ InfosectrainOSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ Infosectrain
 
Esm rel notes_6.0cp2
Esm rel notes_6.0cp2Esm rel notes_6.0cp2
Esm rel notes_6.0cp2
 
A Developer’s Guide to Kubernetes Security
A Developer’s Guide to Kubernetes SecurityA Developer’s Guide to Kubernetes Security
A Developer’s Guide to Kubernetes Security
 
CRA - overview of vulnerability handling
CRA - overview of vulnerability handlingCRA - overview of vulnerability handling
CRA - overview of vulnerability handling
 
Testing Terraform
Testing TerraformTesting Terraform
Testing Terraform
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
ENGS4851_Final_Certified_Report
ENGS4851_Final_Certified_ReportENGS4851_Final_Certified_Report
ENGS4851_Final_Certified_Report
 
ArcSight Express 4.0 Patch 1 release notes
ArcSight Express 4.0 Patch 1 release notesArcSight Express 4.0 Patch 1 release notes
ArcSight Express 4.0 Patch 1 release notes
 
AWS Study Group - Chapter 03 - Elasticity and Scalability Concepts [Solution ...
AWS Study Group - Chapter 03 - Elasticity and Scalability Concepts [Solution ...AWS Study Group - Chapter 03 - Elasticity and Scalability Concepts [Solution ...
AWS Study Group - Chapter 03 - Elasticity and Scalability Concepts [Solution ...
 

More from Radware

Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)
Radware
 
What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)
Radware
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
Radware
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
Radware
 
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF Service
Radware
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...
Radware
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
Radware
 
The Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs DowntimeThe Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs Downtime
Radware
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
Radware
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
Radware
 
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Radware
 
Emotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionEmotional Engagement and Brand Perception
Emotional Engagement and Brand Perception
Radware
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
Radware
 
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
Radware
 
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
SecureWorld St. Louis:  Survival in an Evolving Threat LandscapeSecureWorld St. Louis:  Survival in an Evolving Threat Landscape
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
Radware
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-Attacks
Radware
 
Survival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeSurvival in an Evolving Threat Landscape
Survival in an Evolving Threat Landscape
Radware
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
Radware
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
Radware
 

More from Radware (20)

Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)
 
What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF Service
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
The Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs DowntimeThe Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs Downtime
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
 
Emotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionEmotional Engagement and Brand Perception
Emotional Engagement and Brand Perception
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
 
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
SecureWorld St. Louis:  Survival in an Evolving Threat LandscapeSecureWorld St. Louis:  Survival in an Evolving Threat Landscape
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-Attacks
 
Survival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeSurvival in an Evolving Threat Landscape
Survival in an Evolving Threat Landscape
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Radware ERT Threat Alert: Shellshock Bash

  • 1. Radware Emergency Response Team Threat Alert: Shellshock CVE-2014-6271, CVE-2014-7169 Version 1.0.0 Rev. 1 September 26, 2014
  • 2. Threat Alert | Shellshock Table of Contents Background ....................................................................................................................................3 Risk.................................................................................................................................................3 Mitigation Options............................................................................................................................3 IPS Signatures..............................................................................................................................3 Radware ERT Recommendations..................................................................................................4 Vendor Information...........................................................................................................................4 Additional Information......................................................................................................................4 Contact Information.........................................................................................................................5
  • 3. Threat Alert | Shellshock Background Two new vulnerabilities were recently found in Bash (CVE-2014-6271, CVE-2014-7169). These vulnerabilities potentially affect certain services and applications and allow remote unauthenticated attackers to exploit this issue and use this flaw to override or bypass environment restrictions. This issue affects all products that use Bash and parse values of environment variables. The vulnerable Bash versions are: 1.14.0, 1.14.1, 1.14.2, 1.14.3, 1.14.4, 1.14.5, 1.14.6, 1.14.7, 2.0, 2.01, 2.01.1, 2.02, 2.02.1, 2.03, 2.04, 2.05, 2.05:b, 3.0, 3.0.16, 3.1, 3.2, 3.2.48, 4.0, 4.0:rc1, 4.1, 4.2, 4.3 Risk The vulnerabilities potentially affect certain services and applications and allow remote unauthenticated attackers to inject certain characters into other environments, allowing them to exploit this issue and use this flaw to override or bypass environment restrictions to execute shell commands. Under certain conditions, attackers can also provide specially-crafted environment variables containing arbitrary commands that will be executed on vulnerable systems. This issue affects products using vulnerable version as detailed in the background paragraph. Mitigation Options IPS Signatures Radware Emergency Response Team (ERT) has produced two IPS signatures for the above vulnerabilities. The following commands will implement the signatures in ‘Report Only’ mode in DefensePro: 1.The first signature blocks the pattern "() {" in a request URI therefore will not allow the exploit of the vulnerability to be passed via an HTTP request URI. The "()" is the end of "function_name()" while the " {" is the extra code that is added to the end of the function: dp signatures-protection filter basic-filters user create ERT-bash2-CVE-2014-6271 -p tcp -c x28x29x20x7b -ct "Normalized URL" -ce "Case Sensitive" -dp http dp signatures-protection filter advanced-filters user create group_ERT-bash2-CVE-2014-6271 ERT-bash2-CVE-2014-6271 dp signatures-protection attacks user create 0 -n ERT-bash2-CVE-2014-6271 -f group_ERT- bash2-CVE-2014-6271 -am 0 dp update-policies set 1
  • 4. Threat Alert | Shellshock 2. The second signature blocks the pattern “() { :;};” which was found to be used in many exploits. dp signatures-protection filter basic-filters user create ERT-bash3-CVE-2014-6271 -p tcp -c x28x29x20x7bx20x3ax3bx7dx3b -ct Text -ce "Case Sensitive" -dp http dp signatures-protection filter advanced-filters user create group_ERT-bash3-CVE-2014-6271 ERT-bash3-CVE-2014-6271 dp signatures-protection attacks user create 0 -n ERT-bash3-CVE-2014-6271 -f group_ERT- bash3-CVE-2014-6271 -am 0 dp update-policies set 1 Radware ERT Recommendations • Copy and paste both signature commands into DefensePro CLI and assign them to a protection policy. The signature will be implemented in ‘Report Only’ mode • Carefully inspect false positive rates of the signatures and gain confidence such patterns do not appear normally in your environment before chaning it to ‘Block and Report’ mode • Radware’s recommendation is to patch the vulnerable systems according to instructions provided by the vendor Radware ERT and SOC will continue monitoring for new exploits and will release additional protections as needed. Vendor Information • https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variablescode- injection-attack/ Additional Information References: • https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271 • https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169 THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION IN THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. RADWARE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. RADWARE EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.
  • 5. ERT Attack Report Shellshock Vulnerability Bash – September 2014 Contact Information Radware, Inc. - North America Headquarters Lobby 1 (Visitors) and Lobby 2 (Deliveries) 575 Corporate Drive Mahwah, NJ 07430 Tel: +1 (201) 512-9771 Toll Free: +1 (888) 234-5763 Fax: +1 (201) 512-9774 Email: info@radware.com International Headquarters Radware Ltd. 22 Raoul Wallenberg Street Tel Aviv 69710, Israel Tel: 972-3-766 8666 Fax: 972-3-766-8655 Email: info_il@radware.com For Radware complete offices and locations please visit: http://www.radware.com/Company/Locations.aspx © 2014 Radware, Ltd. All Rights Reserved. Radware and all other Radware product and service names are registered trademarks of Radware in the U.S. and other countries. All other trademarks and names are the property of their respective owners. Printed in the U.S.A.