[Security] Update bash *NOW*

Scott Elcomb psema4-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Fri Sep 26 00:15:48 UTC 2014


On Wed, Sep 24, 2014 at 10:03 PM, Walter Dnes <waltdnes-SLHPyeZ9y/tg9hUCZPvPmw at public.gmane.org> wrote:
>   Slashdot article http://linux.slashdot.org/story/14/09/24/1638207/remote-exploit-vulnerability-found-in-bash
>
>   Story at http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html
>
>   CVE ID CVE-2014-6271 at http://seclists.org/oss-sec/2014/q3/650
>
>   Summary... bash scripts, CGI, perl via "system()", and various other
> "commands" invoke a bash shell at times, passing environmental variables
> in the process.  Problem is that an "environmental variable" ***CAN
> CONTAIN A FUNCTION DEFINITION, AND EXECUTE IT WHILST SPAWNING A NEW
> SHELL***.  E.g. execute the command...

Some scary bits I've seen today:

Looks like DHCP servers can leverage it:
<https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/>

Web server log entry with a shellshock signature and wanting to run rm
-rf / <https://twitter.com/danielcid/status/515244941380177920>

And via <http://beta.slashdot.org/story/207709> there's now a 'wopbot'
on the loose: <http://www.itnews.com.au/News/396197,first-shellshock-botnet-attacks-akamai-us-dod-networks.aspx>

-- 
  Scott Elcomb         @psema4
  http://psema4.com/pubkey.txt
     http://www.pirateparty.ca/
--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list