"Shellshock" bash bug
Nick T.
nick at nickscode.com
Fri Sep 26 15:52:32 UTC 2014
Do we know what the attack surface for desktop computers is?
I know that DHCP is vulnerable and can give root access to a rogue DHCP
server but how about the internet facing programs(firefox,chrome,
thunderbird etc) do such programs invoke bash environment variables?
~ Nick
On 26/09/2014 06:43 μμ, Kevin O'Gorman wrote:
> There has been a code-injection vulnerability in bash for the last 22
> years, recently discovered and named "Shellshock". It's nasty.
> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271
>
> Here's a quick one-liner to see if you're vulnerable:
> $ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
> vulnerable
> this is a test
> $
>
> If you get that result, update your bash from the repositories, and
> all should be well:
> $ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
> bash: warning: x: ignoring function definition attempt
> bash: error importing function definition for `x'
> this is a test
> $
>
> Safe computing to all
>
>
> --
> Kevin O'Gorman
> #define QUESTION ((bb) || (!b)) /* Shakespeare */
>
> Please consider the environment before printing this email.
>
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20140926/bbbac5b8/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 441 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20140926/bbbac5b8/attachment.gif>
More information about the ubuntu-users
mailing list