[Security] Update bash *NOW*
Scott Elcomb
psema4-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Fri Sep 26 00:15:48 UTC 2014
On Wed, Sep 24, 2014 at 10:03 PM, Walter Dnes <waltdnes-SLHPyeZ9y/tg9hUCZPvPmw at public.gmane.org> wrote:
> Slashdot article http://linux.slashdot.org/story/14/09/24/1638207/remote-exploit-vulnerability-found-in-bash
>
> Story at http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html
>
> CVE ID CVE-2014-6271 at http://seclists.org/oss-sec/2014/q3/650
>
> Summary... bash scripts, CGI, perl via "system()", and various other
> "commands" invoke a bash shell at times, passing environmental variables
> in the process. Problem is that an "environmental variable" ***CAN
> CONTAIN A FUNCTION DEFINITION, AND EXECUTE IT WHILST SPAWNING A NEW
> SHELL***. E.g. execute the command...
Some scary bits I've seen today:
Looks like DHCP servers can leverage it:
<https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/>
Web server log entry with a shellshock signature and wanting to run rm
-rf / <https://twitter.com/danielcid/status/515244941380177920>
And via <http://beta.slashdot.org/story/207709> there's now a 'wopbot'
on the loose: <http://www.itnews.com.au/News/396197,first-shellshock-botnet-attacks-akamai-us-dod-networks.aspx>
--
Scott Elcomb @psema4
http://psema4.com/pubkey.txt
http://www.pirateparty.ca/
--
The Toronto Linux Users Group. Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists
More information about the Legacy
mailing list