Upstream ksh93 maintainer Siteshwar Vashisht reports:
A flaw was found in the way ksh evaluates certain environment
variables. An attacker could use this flaw to override or bypass
environment restrictions to execute shell commands. Services and
applications that allow remote unauthenticated attackers to
provide one of those environment variables could allow them to
exploit this issue remotely.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center