IBM is just one of the many technology companies struggling to patch products affected by the GNU Bash vulnerability dubbed “ShellShock.”
Responding to the threat, IBM has analyzed its products and services and began publishing advisories for each of the affected solutions on September 27. The list of affected products includes QRadar, Algo One Managed Data Service on Cloud, InfoSphere Guardium Database Activity Monitoring, WebSphere Message Broker v8 HVE, and Integration Bus V9 HVE.
Starting with October 1, security bulletins have been published for WebSphere Transformation Extender with Launcher Hypervisor Edition, Proventia Network Enterprise Scanner, Algo Risk Service on Cloud, Security Network Intrusion Prevention System, Security Proventia Network Multi-Function Security System, InfoSphere Balanced Warehouse, Smart Analytics System, Security Access Manager for Mobile and Web, TSSC, the SmartCloud Entry appliance, and Security Privileged Identity Manager Virtual Appliance (PIM VA).
eDiscovery Identification and Collection, IBM Policy Assessment and Compliance, Unstructured Data Identification and Management, Worklight Quality Assurance (WQA), Flex System Manager, Security Access Manager for Enterprise Single Sign-On Virtual Appliance (ISAM ESSO VA), Power Hardware Management Console, DS8000 HMC, and Security Access Manager for Enterprise Single Sign-On Virtual Appliance (ISAM ESSO VA) also use vulnerable versions of Bash.
This week, IBM published individual security bulletins for SmartCloud Provisioning for IBM Provided Software Virtual Appliance, Real-time Compression Appliance, and Workload Deployer.
On Thursday, the company released a report containing the names of products that are not affected by the ShellShock bug. IBM says its products are being analyzed to determine which of them are vulnerable, and promises to issue fixes as soon as possible.
“IBM recommends that you review your entire environment to identify vulnerable releases of Bash including your Operating Systems and take appropriate mitigation and remediation actions. Please contact your Operating System provider for more information. If your product supports patching the OS by the customer please patch your system,” the company advised.
Several major companies have started patching their products to ensure they are not vulnerable to ShellShock attacks. Oracle, Cisco, VMware have already published some software updates, while Siemens posted an advisory earlier in the week providing workarounds that can be applied until patches for some of its industrial products become available.