"Shellshock" bash bug
Hal Burgiss
hal at burgiss.net
Fri Sep 26 21:40:20 UTC 2014
On Fri, Sep 26, 2014 at 5:17 PM, Colin Law <clanlaw at gmail.com> wrote:
> On 26 September 2014 16:43, Kevin O'Gorman <kogorman at gmail.com> wrote:
>
>> There has been a code-injection vulnerability in bash for the last 22
>> years, recently discovered and named "Shellshock". It's nasty.
>> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271
>>
>
>
> I don't fully understand the description. I have a system that cannot be
> updated that has an ssh port open to the internet, with access by keys
> only. Is that system vulnerable to attack?
>
> Colin
>
>
>
It is an issue anytime a shell that is running an unpatched bash. It allows
the user to run commands as the user that started the bash shell. In the
ssh case, $user can run commands only as $user. They can't run commands as
root. Or other users, just him/herself. So little value in that.
In the cgi case, where apache is the user, then the remote user can run
commands as apache (and probably run php or mysql code or access anything
apache can). At least as I understand it.
http://unix.stackexchange.com/questions/157477/how-can-shellshock-be-exploited-over-ssh
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20140926/f3cc24fc/attachment.html>
More information about the ubuntu-users
mailing list