Security Advisory: GNU Bash ShellShock Remote Code

Security Advisory
Security Advisory: GNU Bash
ShellShock Remote Code Execution
September 28, 2014
This document details the status of Radware products in regard to the CVE-2014-6271 and
CVE-2014-7169
Radware will continue to investigate the vulnerabilities implications on Radware’s products and
will issue updates and mitigation plans when needed.
CVE Overview
CVE-2014-6271
GNU Bash through 4.3 processes trailing strings after function definitions in the values of
environment variables, which allows remote attackers to execute arbitrary code via a crafted
environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH
sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by
unspecified DHCP clients, and other situations in which setting the environment occurs across a
privilege boundary from Bash execution, aka "ShellShock."
CVE-2014-7169
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function
definitions in the values of environment variables, which allows remote attackers to write to files
or possibly have unknown other impact via a crafted environment, as demonstrated by vectors
involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in
the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in
which setting the environment occurs across a privilege boundary from Bash execution
Impact
A malicious user can exploit this vulnerability to cause remote code execution on a vulnerable
system
Summary of Radware Product Exposure to CVEs
The following table summarizes Radware’s products and their exposures to these CVE
vulnerabilities:
Security Advisory: GNU Bash ShellShock Remote Code Execution:, September 28, 2014 Page 2
Product
CVEs Exposure
Comments
Alteon
None
Alteon isn’t vulnerable from traffic or
management interfaces
Alteon VA
Yes
Fixed version will be available on October
12th
AppDirector
None
AppDirector isn’t Linux based therefore isn’t
vulnerable (there is internal functionality in
AppDirector which is Linux based and is
used for internal process which isn’t public
therefore also isn’t vulnerable)
DefensePro
None
No Bash commands are executed from user
inputs on management interface
On Data traffic no relevant interface is
exposed, therefore not vulnerable.
AppWall
None
AppWall isn’t vulnerable on both traffic and
management interfaces.
LinkProof
None
LinkProof isn’t Linux based therefore isn’t
vulnerable
AppXcel
None
No Bash access is available from traffic or
management interfaces
CID
None
CID isn’t Linux based therefore isn’t
vulnerable
FastView
None
No Bash access is available from traffic
interface
APSolute Vision
Yes
The risk of exploiting the vulnerability is
limited as long as the APSolute Vision
appliance is not accessible from the external
network. A fix will be provided shortly
SharePath APM
Server
Yes
The risk of exploiting the vulnerability is
limited as long as the SSH and Telnet
access to SharePath virtual appliance from
the external network is restricted. A fix will be
provided shortly
Security Advisory: GNU Bash ShellShock Remote Code Execution:, September 28, 2014 Page 3
Product
CVEs Exposure
Comments
inflight
Yes
The risk of exploiting the vulnerability is
limited as long as the SSH and Telnet
access to Inflight appliance from the external
network is restricted. A fix will be provided
shortly
Mitigation Plan
DefensePro
Radware Emergency Response Team (ERT) has produced two IPS signatures for the
vulnerabilities. More information is available in the link below
http://www.radware.com/NewsEvents/PressReleases/Shellshock-Vulnerability/
AppWall
AppWall can provide a security to web application using a filter that detect a risky pattern used
to attack web servers found in these vulnerabilities. The filter will detect pattern “() {“used to
initiate attack and will drop this traffic.
Further information will be provided.
Alteon VA
A fix for Alteon VA will be available on October 12th on the following software versions:

30.0.1.0

29.5.1.10

29.0.3.10

28.1.13.10
Security Advisory: GNU Bash ShellShock Remote Code Execution:, September 28, 2014 Page 4
Document version
Date
Issued By
1.0
September 26, 2014
Ami Barayev
1.01
September 26, 2014
Ami Barayev
Added inflight and
APSolute Vision and
SharePath APM
Server mitigation
were added
1.02
September 28, 2014
Ami Barayev
Fix date for Alteon
VA
North America
International
Radware Inc.
Radware Ltd.
575 Corporate Drive
22 Raoul Wallenberg St.
Mahwah, NJ 07430
Tel Aviv 69710, Israel
Tel: +1-888-234-5763
Tel: 972 3 766 8666
Main Changes
© 2014 Radware, Ltd. All Rights Reserved. Radware and all other Radware product and service names are registered
trademarks of Radware in the U.S. and other countries. All other trademarks and names are the property of their respective
owners. Printed in the U.S.A
Security Advisory: GNU Bash ShellShock Remote Code Execution:, September 28, 2014 Page 5