Browse: Home / Does VMware Products are affected by “Shellshock” Bash Vulnerability ?

Menu

Skip to content
  • About
  • Contact Me
  • Privacy Policy
  • Table of Contents

VMware ArenaLogo

Reserved Space for Virtualization

Menu

Skip to content
  • Home
  • vSphere
    • vSphere 7
    • vSphere 6.5
    • vSphere 6.0
    • vSphere 5.5
    • vSphere 5.1
    • vSphere 5.0
    • vSphere 5.5 Upgrade series
  • Free E-books
    • Virtualization
    • Storage
    • Disaster Recovery
    • Linux OS
    • Network
    • Security
  • Frequently Asked
    • Comparison Articles >>
      • Diff Between vSphere 6.7 and 7.0
      • Diff between NSX-V and NSX-T
      • Diff between All-Flash and Hybrid VSAN
      • Diff between Physical and Virtual RDM
      • Diff Standard & Distributed Switch
      • VMware ESXi vs Hyper-V
      • Diff vSphere 5.1 and vSphere 5.5
      • Diff between ESX and ESXi
      • Diff between ESX 3.5 and 4.0
      • Diff between ESX 4.1 and 5.0
      • Diff VCenter 5.5 appliance and vCenter on WIndows
      • Diff between VMFS3 and VMFS5
      • Diff between New and Upgarded VMFS 5
      • Diff Clone and Template
    • High Availability
    • Networking
    • VMware FT
    • General Q&A
  • Deep-Dives
    • VMware NSX-T
    • Hyper-V & SCVMM
    • VMware NSX
    • VMware Virtual SAN
    • VMware Site Recovery Manager (SRM)
    • VMware Horizon View
    • vSphere Distributed Switch Series
    • Microsoft Cluster Setup on VMware
    • vCloud Director Setup Series
    • ESXTOP Command Line
    • HA Slots Calculation
    • Video Training’s -YouTube
  • Advertise
  • Partners
    • Veeam
    • Vembu

Does VMware Products are affected by “Shellshock” Bash Vulnerability ?

Posted by Mohammed Raffic on Last updated Dec 20, 2014 at 9:40PM | Published on Sep 29, 2014 in Uncategorized | 2092 Views | 1 Response

You might have heard above the Bash ShellShock Vulnerability from few days back. It is really more vulnerable than Heartbleed because Heartbleed was all about sniffing the system memory but Shellshock has opened the door so widely by allowing attackers can take the system control remotely. Millions of computers are using bash shell (command interpreter ). New security flaw has been found on bash(Bash Code Injection Vulnerability (CVE-2014-6271 & CVE-2014-7169) BASH(Bourne-Again SHell) is the default shell in all the Linux flavors(Redhat Linux,Open SUSE,Ubuntu etc.. Some of the other operating systems also shipped with bash shell but not a default shell. Almost all the vendors are in process of releasing the Patches for the Bash ShellShock vulnerability. As It’s already a question raised whether VMware Products are affected?. Please find the update from VMware about the Bash Code (ShellShock) Injection Vulnerability.

bash-shellshock

VMware Products:

  • vSphere ESXi/ESX Hypervisor

    ESXi 4.0, 4.1, 5.0, 5.1, and 5.5 are not affected because these versions use the Ash shell (through busybox), which is not affected by the vulnerability reported for the Bash shell.

    ESX 4.0 and 4.1 have a vulnerable version of the Bash shell.

    Note: After careful consideration, VMware will make VMware ESX 4.0 and 4.1 security patches available for the Bash Shell vulnerability.  This security patch release is an exception to the existing VMware lifecycle policy. VMware is making this exception because of the reported critical severity of the Bash vulnerability and because the product passed the end of general support within the last four months.  We encourage you to upgrade to our most current releases. The VMware Global Services teams are available to assist you in any way.

  • Products that run on Windows

    Windows-based products, including all versions of vCenter Server running on Windows, are not affected.

  • Products that are shipped as a virtual appliance or as an appliance

    The (virtual) appliances listed below ship with an affected version of Bash. While VMware has not demonstrated that the Bash vulnerability can be leveraged on these appliances, VMware will take the cautionary measure of re-releasing them.

    VMware (Virtual) Appliances

    • EVO:RAIL 1.x
    • Horizon DaaS Platform 6.x
    • Horizon Workspace 1.x, 2.0
    • IT Business Management Suite 1.x
    • NSX for Multi-Hypervisor 4.x
    • NSX for vSphere 6.x
    • NVP 3.x
    • vCenter Chargeback 2.x
    • vCenter Hyperic Server 5.x
    • vCenter Infrastructure Navigator 5.x
    • vCenter Log Insight 1.0, 2.0
    • vCenter Operations Manager 5.x
    • vCenter Orchestrator Appliance 4.x, 5.x
    • vCenter Server Appliance 5.x
    • vCenter Support Assistant 5.x
    • vCloud Automation Center 6.x Note: vCloud Automation Center 5.x is not a virtual appliance
    • vCloud Automation Center Application Services 6.x
    • vCloud Connector 2.x
    • vCloud Networking and Security 5.x
    • vCloud Usage Meter 3.x
    • vFabric Application Director 5.x, 6.x
    • vFabric Postgres 9.x
    • Viewplanner 3.x
    • VMware Application Dependency Planner
    • VMware HealthAnalyzer 5.x
    • VMware Studio 2.x
    • VMware TAM Data Manager
    • VMware Workbench 3.x
    • vSphere App HA 1.x
    • vSphere Big Data Extensions 1.x, 2.x
    • vSphere Data Protection 5.x
    • vSphere Management Assistant 5.x
    • vSphere Replication 5.x
    • vSphere Storage Appliance 5.x

    Important: VMware encourages restricting access to appliances through firewall rules and other network layer controls to only trusted IP addresses. This measure will greatly reduce any risk to these appliances.

  • Products that run on Linux, Android, Mac OS or iOS (excluding virtual appliances)
    Products that run on Linux, Android, Mac OS or iOS (excluding virtual appliances) might use the Bash shell that is part of the operating system. In case the operating system has a vulnerable version of Bash, the Bash security vulnerability might be exploited through the product. VMware recommends that customers contact their operating system vendor for a patch.Examples of products in this category include VMware Workstation, VMware Fusion, and AirWatch MDM software.

For more information, Please take a look at the VMware KB Article 2090740. I hope this is really informative for you. Stay tuned to get more information about the patch release on Bash Vulnerability from affected products. I hope this is informative for you. Thanks for Reading!!. Be Social and share it in social media, if you feel worth sharing it.

Posted in Uncategorized | Tagged Bash Vulnerability

Subscribe to our Channel


Popular Posts

  • Manually Download VMware Tools ISO Image

    Manually Download VMware Tools ISO Image

    478247 views / Posted Last updated Jul 4, 2017 at 1:11PM | Published on Sep 14, 2013
  • Download link for All Versions of VMware vSphere Client

    Download link for All Versions of VMware vSphere Client

    468581 views / Posted Last updated Jul 4, 2017 at 1:12PM | Published on Sep 23, 2014
  • vSphere 6.0 – Download Free ESXi 6.0 License Keys

    vSphere 6.0 – Download Free ESXi 6.0 License Keys

    265071 views / Posted Last updated Jan 18, 2018 at 7:43AM | Published on Mar 13, 2015
  • vSphere 5.5 - Download Free ESXi 5.5 License Keys

    vSphere 5.5 – Download Free ESXi 5.5 License Keys

    256173 views / Posted Last updated Jan 1, 2016 at 8:16AM | Published on Oct 9, 2013
  • vSphere 6.0 -Difference between vSphere 5.0, 5.1, 5.5 and vSphere 6.0

    vSphere 6.0 -Difference between vSphere 5.0, 5.1, 5.5 and vSphere 6.0

    211015 views / Posted Last updated Jul 4, 2017 at 1:14PM | Published on Feb 3, 2015
  • 101 Free Tools for VMware Administrators

    101 Free Tools for VMware Administrators

    201472 views / Posted Last updated Jan 30, 2020 at 11:06AM | Published on Jun 16, 2013
  • VMware Converter

    VMware Converter : How to perform P2V and V2V Migration

    151185 views / Posted Last updated Aug 18, 2017 at 7:49PM | Published on Aug 18, 2017
  • Difference between VMware ESX and ESXi

    Difference between VMware ESX and ESXi

    150190 views / Posted Last updated Sep 24, 2017 at 10:08PM | Published on Jun 28, 2013
The views expressed here are my personal opinions. Content published here does not reflect the views and opinions of VMware.
 
 
 
 

©2014 VMwareArena

Menu

  • About
  • Contact Me
  • Privacy Policy
  • Table of Contents
Go to mobile version