Select Page

cloudlinux bash vulnerability


Fix Bash vulnerability in CentOS, RedHat, CloudLinux, Ubuntu Servers

[UPDATE 1st Oct] – More vulnerabilities were reported since this post was originally written on Sep 26th. See the notes at the bottom.

Highly critical Bash code injection vulnerability CVE-2014-6217 was declared on 24th Sep, and a patch is now available for all popular Linux web hosting servers such as CentOS, RedHat, Fedora, CloudLinux, Ubuntu, Debian and OpenSuse.

 

Hire Bobcares Linux Server Administrators
Get super reliable servers and delighted customers

See how we do it!

 

If you have a Linux web hosting server, it has Bash, and if you haven’t expressly patched it, assume that your server is vulnerable to hack. Linux web hosting servers are typically enabled with CGI modules, and they could allow commands to be passed on to Bash, thus opening the gates to hackers. (more…)

Resolving Bash vulnerability in DirectAdmin servers : How to fix CVE-2014-6217 Bash “Shell Shock” vulnerability

[UPDATE 1st Oct] – More vulnerabilities were reported since this post was originally written on Sep 26th. See the notes at the bottom.

Highly critical Bash code injection vulnerability CVE-2014-6217 was declared on 24th Sep, and a patch is now available for DirectAdmin servers.

If you have a DirectAdmin server, it has Bash, and if you haven’t expressly patched it, assume that your server is vulnerable to hack. DirectAdmin servers are typically enabled with CGI modules, and they could allow commands to be passed on to Bash, thus opening the gates to hackers. (more…)

Resolving Bash vulnerability in Parallels Plesk Linux servers : How to fix CVE-2014-6217 Bash “Shell Shock” vulnerability

[UPDATE 1st Oct] – More vulnerabilities were reported since this post was originally written on Sep 26th. See the notes at the bottom.

Highly critical Bash code injection vulnerability CVE-2014-6217 was declared on 24th Sep, and a patch is now available for Parallels Plesk servers.

If you have a Plesk Linux server, it has Bash, and if you haven’t expressly patched it, assume that your server is vulnerable to hack. Plesk servers are typically enabled with CGI modules, and they could allow commands to be passed on to Bash, thus opening the gates to hackers. (more…)