Our website uses cookies. To find out more information on the cookies we use, please head to our privacy policy.OK

Osirium is safe from Shell Shock

Osirium is not affected by CVE-2014-6271 (“Shellshock”). Our use of modern web technologies ensures that all Osirium servers, regardless of version, cannot be exploited through the use of this vulnerability.

For more information about CVE-2014-6271, visit http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271 If you’re an Osirium customer and would like to discuss CVE-2014-6271, or anything else concerning Osirium’s security, don’t hesitate to get in touch at support@osirium.com.

Related Articles

term->name is DevOps

Database Task Automation for Asterisk (AsteriskNOW)

We used our Privileged Task Management module to grant secure access to the Call Record Database of our AsteriskNow implementation.… Read Post

Using Elastic Stack with the Osirium Privileged Management Platform

Since releasing our Privileged Behaviour Management module we’ve had plenty of customer feedback. Here’s the How-To video for using… Read Post

Implementing the Dual Account model with Osirium’s PxM platform

The Dual Account model has long been best practice amongst SysAdmins and DevOps. Osirium’s PxM Platform can strengthen the approach.… Read Post