<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: shellshock vulnerability in Security</title>
    <link>https://community.extremenetworks.com/t5/security/shellshock-vulnerability/m-p/28193#M125</link>
    <description>It looks like extreme has published an official assessment at &lt;A href="http://www.extremenetworks.com/support/software/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.extremenetworks.com/support/software/&lt;/A&gt;. Scroll down the page to security materials to see the bash announcement.&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Sat, 27 Sep 2014 08:00:00 GMT</pubDate>
    <dc:creator>Ben_Parker</dc:creator>
    <dc:date>2014-09-27T08:00:00Z</dc:date>
    <item>
      <title>shellshock vulnerability</title>
      <link>https://community.extremenetworks.com/t5/security/shellshock-vulnerability/m-p/28190#M122</link>
      <description>when can we reckon with a statement about the shellshock vulnerabilty ?&lt;BR /&gt;
are there any advises regarding this problem to enterasys / extreme products to bypass the time untill an official statement / patches for the affected products are released?are there products which are for sure not affected ( products without a bash or without access to the bash) ?&lt;BR /&gt;
&lt;BR /&gt;
Thank you for any reply&lt;BR /&gt;
&lt;BR /&gt;
Regards, &lt;BR /&gt;
&lt;BR /&gt;
Patrick</description>
      <pubDate>Fri, 26 Sep 2014 13:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/security/shellshock-vulnerability/m-p/28190#M122</guid>
      <dc:creator>Patrick_Graf</dc:creator>
      <dc:date>2014-09-26T13:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: shellshock vulnerability</title>
      <link>https://community.extremenetworks.com/t5/security/shellshock-vulnerability/m-p/28191#M123</link>
      <description>Also definitely interested in the response to this. Based on preliminary testing, I spun up a Netsight vm with 6.1.0137 and it was running bash 4.2.24(1) which is in the range of vulnerable versions but I didn't receive the expected output when testing for a vulnerable version. I am concerned though because Netsight, NAC and Purview appliances are all running similar code it looks like and they have web servers on them so NAC would be a great attack vector for malicious worms.&lt;BR /&gt;
&lt;BR /&gt;
I am not sure about the wireless controllers or XOS. Based on some googling it looks like XOS can running bash commands, but I am new enough to it that I am not sure how that works.&lt;BR /&gt;
&lt;BR /&gt;
Looking forward to the updates soon.&lt;BR /&gt;
Thanks&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Sep 2014 20:16:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/security/shellshock-vulnerability/m-p/28191#M123</guid>
      <dc:creator>Ben_Parker</dc:creator>
      <dc:date>2014-09-26T20:16:00Z</dc:date>
    </item>
    <item>
      <title>RE: shellshock vulnerability</title>
      <link>https://community.extremenetworks.com/t5/security/shellshock-vulnerability/m-p/28192#M124</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
An official statement should be made shortly. Let's wait for it for the detail.&lt;BR /&gt;
EXOS shouldn't be exposed to this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
Regards&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Sep 2014 22:48:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/security/shellshock-vulnerability/m-p/28192#M124</guid>
      <dc:creator>Stephane_Grosj1</dc:creator>
      <dc:date>2014-09-26T22:48:00Z</dc:date>
    </item>
    <item>
      <title>RE: shellshock vulnerability</title>
      <link>https://community.extremenetworks.com/t5/security/shellshock-vulnerability/m-p/28193#M125</link>
      <description>It looks like extreme has published an official assessment at &lt;A href="http://www.extremenetworks.com/support/software/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.extremenetworks.com/support/software/&lt;/A&gt;. Scroll down the page to security materials to see the bash announcement.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Sat, 27 Sep 2014 08:00:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/security/shellshock-vulnerability/m-p/28193#M125</guid>
      <dc:creator>Ben_Parker</dc:creator>
      <dc:date>2014-09-27T08:00:00Z</dc:date>
    </item>
  </channel>
</rss>

