I'm surprised to not see any posts about this today, but hey here goes.
If you haven't read about it, DROP WHAT YOU ARE DOING and read it now. Seriously!
http://www.theverge.com/2014/9/25/6843669/bash-shellshock-network-worm-could-cause-internet-meltdown
I did update my CentOS 6 servers using:
sudo yum update bash
and verified that most methods did not show the vulnerability. But there is talk that this is *not* a complete patch. So I'm not feeling confident.
Besides the command line, CGI scripts are the big vulnerability. I don't use/need these, but they are apparently turned on *by default* grr. Who uses cgi-bin any more? I'm sure there must be a few, but all our apps use PHP.
So, I'm looking to disable CGI-BIN server-wide from the command-line. No information in the Parallels help system that I could find. I don't want to use the GUI to click away for hours on end when I could write a script to do it...if I know what command to issue!
Any comments appreciated!
If you haven't read about it, DROP WHAT YOU ARE DOING and read it now. Seriously!
http://www.theverge.com/2014/9/25/6843669/bash-shellshock-network-worm-could-cause-internet-meltdown
I did update my CentOS 6 servers using:
sudo yum update bash
and verified that most methods did not show the vulnerability. But there is talk that this is *not* a complete patch. So I'm not feeling confident.
Besides the command line, CGI scripts are the big vulnerability. I don't use/need these, but they are apparently turned on *by default* grr. Who uses cgi-bin any more? I'm sure there must be a few, but all our apps use PHP.
So, I'm looking to disable CGI-BIN server-wide from the command-line. No information in the Parallels help system that I could find. I don't want to use the GUI to click away for hours on end when I could write a script to do it...if I know what command to issue!
Any comments appreciated!