If you’re running a Linux server, you’ll want to head over to our Knowledge Base this week for some important information regarding the Bash vulnerability found on September 24th. This vulnerability exploits Bash, a Unix command-line shell run by default on most Linux servers, and allows for remote code execution and many types of command-line based attacks. Check out our recent posts related to this vulnerability for more information:
Find out if your server is vulnerable to the exploit and read more details about the issue.
Learn how to update Bash to protect your server against the CVE-2014-6271 and CVE-2014-7169 vulnerabilities on Red Hat and CentOS.
Learn how to update Bash to protect your server against the CVE-2014-6271 and CVE-2014-7169 vulnerabilities on Debian and Ubuntu.
Don’t see what you need to know? Contact our Heroic Support® team and we’ll help!