I have a few remote hosts to which I have ssh access. On two of them, I have deployed git repos. For one of the hosts, I control the server and I can gain an unrestricted shell via ssh (after RSA-based authentication). For the other host, it's controlled by a web hosting company, so I can ssh, but with limitations.
Do either of these scenarios sound like they might be vulnerable based on what we know about Shellshock?
My other problem is patching. I have already patched my local machines, which from what I understand is required based on the potential for a malicious DHCP server to burn clients using the vulnerable bash version. For the remote host at the web company, I guess I'll need to rely on them to patch bash. Most unfortunately, for the remote host I control, it's running on an ARM-based NAS server that is using a custom software suite built specifically for that platform, so I'll have to wait for the dev(s) on that platform to push out a fix, which may or may not ever come. This may serve to accelerate my plans to migrate the NAS away from the ARM system to a legit *nix/BSD environment on bigger hardware



