What is Shellshock?
The Shellshock Vulnerability (CVE-2014-6271) is a serious vulnerability in Bash on Linux.
According to RedHat, “A flaw was found in the way Bash (aka bourne-again shell) evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.”
There was an original fix published for CVE-2014-6271, but it proved to be incorrect and/or incomplete, so a second advisory was issued (CVE-2014-7169) to address this.
Who is impacted by Shellshock?
Because some of Trend Micro’s products are designed to run on or protect Linux-based platforms, some of these products may be affected by this vulnerability. This article contains the list of products that are affected and the recommended action to take to eliminate the risks as they are identified and corrected.
Trend Micro products that are running on Windows are not affected by the Bash Bug. Trend external servers including SaaS servers are also unaffected.
Linux, Unix, or Mac-based products that are not affected
|CPM for Mac||1.1, 2.0|
|Deep Discovery Inspector||All|
|Deep Security as a Service (DSaaS)||All|
|Deep Security for Web Apps||2.1|
|Email Encryption Gateway (TMEEG)||5, 5.5|
|Email Reputation Service (ERS)||All|
|Email Security Platform for Service Providers - White Label||1.0|
|Full Disk Encryption (TMFDE)||5.0/3.1.3|
|Hosted Email Security||1.9 and 2.0|
|Hosted Mobile Security||1.6|
|InterScan for Cisco CSC-SSM||6.6|
|InterScan Messaging Security Suite (IMSS)||7.0/7.1|
|InterScan Web Security as a Service (IWSaaS)||1.9|
|InterScan Web Security Suite||All|
|Licensing Management Portal (LMP)/Customer Licensing Portal (CLP)||All|
|Network VirusWall Enforcer (NVWE)||All|
|SafeSync for Business||All|
|ScanMail for Domino / ScanMail for IBM Domino||All|
|SecureCloud||3.0, 3.5, 3.6 (Cent OS)|
|ServerProtect for Linux||All|
|Threat Discovery Appliance (TDA) / Deep Discovery Inspector (DDI)||All|
|Threat Mitigator (TMTM)||2.58,2.6, 2.6 SP1, 2.6 SP2|
|Mobile Security for Enterprise||All|
|Worry-free Business Security Services||5.6|
|Home and Home Office Products||Version|
|Safesync for Consumer||All|
|SafeSync for xSP||2.0 (Mac)|
|Security for Mac (TMSM)||1.5, 1.6, 2.0|
|Titanium for Mac|
Linux, Unix, or Mac-based products that require updates
|Advanced Reporting Module (ARM)||1.5, 1.6|
|Data Loss Prevention Network Monitor (DLPNM)||2.0|
|Interscan Messaging Security Virtual Appliance (IMSVA)||8.0, 8.2, 8.5|
|Interscan Web Security Virtual Appliance (IWSVA)|| |
5.5, 5.6, 6.0 SP1, 6.5
|SafeSync for Enterprise (SSFE)|| |
2.1, 3.1, 3.2
|Smart Protection Server (SPS)|| |
2.5, 2.6, 3.0
|Deep Security Virtual Appliance (DSVA)|| |
What if my product is not listed?
If the product has not reached End-of-Support, it is most likely that Trend Micro is still analyzing the vulnerability and it’s impact on your product. As soon as the analysis is completed, the product will be added in the list.
What if I have additional questions?
For additional inquiries, contact Trend Micro Technical Support.