Re: [WIRELESS-LAN] Cisco Security Advisory: GNU Bash Environmental Variable Command Injection Vulnerability
Good news. They just moved WLC to "Not Vulnerable". --- Dennis Xu Analyst 3, Network Infrastructure Computing and Communications Services(CCS) University of Guelph 519-824-4120 Ext 56217 d...@uoguelph.ca www.uoguelph.ca/ccs - Original Message - From: "Eric T. Barnett" To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Sent: Friday, September 26, 2014 12:09:49 PM Subject: Re: [WIRELESS-LAN] Cisco Security Advisory: GNU Bash Environmental Variable Command Injection Vulnerability Just FYI, I believe they're calling this particular vulnerability is called "ShellShock" if you want to research this further. Eric Barnett Wireless Administrator Information and Technology Services Arkansas State University 870 680 4243 -Original Message- From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Trent Hurt Sent: Thursday, September 25, 2014 8:47 PM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: [WIRELESS-LAN] Cisco Security Advisory: GNU Bash Environmental Variable Command Injection Vulnerability http://tools.cisco.com/security/center/mcontent/CiscoSecurityAdvisory/cisco-sa-20140926-bash Sent from my iPhone ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
RE: [WIRELESS-LAN] Cisco Security Advisory: GNU Bash Environmental Variable Command Injection Vulnerability
Just FYI, I believe they're calling this particular vulnerability is called "ShellShock" if you want to research this further. Eric Barnett Wireless Administrator Information and Technology Services Arkansas State University 870 680 4243 -Original Message- From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Trent Hurt Sent: Thursday, September 25, 2014 8:47 PM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: [WIRELESS-LAN] Cisco Security Advisory: GNU Bash Environmental Variable Command Injection Vulnerability http://tools.cisco.com/security/center/mcontent/CiscoSecurityAdvisory/cisco-sa-20140926-bash Sent from my iPhone ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
Re: [WIRELESS-LAN] Cisco Security Advisory: GNU Bash Environmental Variable Command Injection Vulnerability
Frank: *Description** **Symptoms:* The Cisco Wireless LAN Controller includes a version of bash that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2014-6271 CVE-2014-7169 This bug has been opened to address the potential impact on this product. *Conditions:* Devices with default configuration. *Workaround:* Not available. *Further Problem Description:* *PSIRT Evaluation:* The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.5/7.5: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html *Customer Visible* *Was the description about this Bug Helpful?* (0) *Details** **Last Modified:* Sep 25,2014 *Status:* Open *Severity:* 2 Severe *Product:* Cisco 5500 Series Wireless Controllers *Support Cases:* 0 *Known Affected Releases: * (3) 7.4(121.0) 7.6(130.0) 8.0(100.0) *Known Fixed Releases: * (0) On 9/25/14 7:13 PM, Frank Bulk wrote: > Frustrating that I can't drill down on this one: Cisco Wireless LAN > Controller [CSCur02981] > > Frank > > -Original Message- > From: The EDUCAUSE Wireless Issues Constituent Group Listserv > [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Trent Hurt > Sent: Thursday, September 25, 2014 8:47 PM > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU > Subject: [WIRELESS-LAN] Cisco Security Advisory: GNU Bash Environmental > Variable Command Injection Vulnerability > > http://tools.cisco.com/security/center/mcontent/CiscoSecurityAdvisory/cisco- > sa-20140926-bash > > > Sent from my iPhone > ** > Participation and subscription information for this EDUCAUSE Constituent > Group discussion list can be found at http://www.educause.edu/groups/. > > ** > Participation and subscription information for this EDUCAUSE Constituent > Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
RE: [WIRELESS-LAN] Cisco Security Advisory: GNU Bash Environmental Variable Command Injection Vulnerability
Frustrating that I can't drill down on this one: Cisco Wireless LAN Controller [CSCur02981] Frank -Original Message- From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Trent Hurt Sent: Thursday, September 25, 2014 8:47 PM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: [WIRELESS-LAN] Cisco Security Advisory: GNU Bash Environmental Variable Command Injection Vulnerability http://tools.cisco.com/security/center/mcontent/CiscoSecurityAdvisory/cisco- sa-20140926-bash Sent from my iPhone ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.