"Shellshock" bash bug
Robert Heller
heller at deepsoft.com
Sat Sep 27 12:39:52 UTC 2014
At Sat, 27 Sep 2014 08:15:08 -0400 "Ubuntu user technical support, not for general discussions" <ubuntu-users at lists.ubuntu.com> wrote:
>
> On Saturday 27 September 2014 02:43:19 Colin Law did opine
> And Gene did reply:
> > On 27 September 2014 01:31, Gene Heskett <gheskett at wdtv.com> wrote:
> > > On Friday 26 September 2014 17:17:06 Colin Law did opine
> > >
> > > And Gene did reply:
> > >> On 26 September 2014 16:43, Kevin O'Gorman <kogorman at gmail.com>
> wrote:
> > >> > There has been a code-injection vulnerability in bash for the last
> > >> > 22 years, recently discovered and named "Shellshock". It's
> > >> > nasty.
> > >> > http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271
> > >>
> > >> I don't fully understand the description. I have a system that
> > >> cannot be updated that has an ssh port open to the internet, with
> > >> access by keys only. Is that system vulnerable to attack?
> > >>
> > >> Colin
> > >
> > > Top posting, bah! Read the rest of the message below, open a terminal
> >
> > Who is top posting? I had read the rest of the post. My question
> > related to the the quoted section.
> >
> > >> > Here's a quick one-liner to see if you're vulnerable:
> > >> > $ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
> > >> > vulnerable
> > >
> > > And enter into the terminal from the keyboard, the above line
> > > starting with "env", to the end at 'test"', duplicating the
> > > quotation marks etc you see above.
> > >
> > > Then hit enter and you should get the vulnerable return if you are,
> > > or the bash error shown below, ending in the last line 'this is a
> > > test'. That response says you are not vulnerable.
> >
> > No, the message tells me that I have a vulnerable version of bash
> > installed, not whether my system is vulnerable to attack as I asked.
> > The point is that with a machine that is only open to the internet via
> > ssh with access by keys only, is the system vulnerable? So far that
> > answer seems to be no, provided one's router is not hacked.
> >
> > Colin
>
> I have no knowledge of what is in the average router, only what is in mine
> which has been reflashed to dd-wrt. There is not a full blown bash in
> that, underneath its Busybox. Busybox linux doesn't have a byte of code
> in it that is not used, and that which is used is often stripped of
> features not needed in a router specialized use, so my assumption, which
> is exactly that, a SWAG if you want to use the term, is that its enough
> different that the answer almost certainly has to be no.
>
> No one has yet reported that their router has been powned that I know of
> except me. The first one I ever bought, a Seimans from circuit city about
> 14 or 15 years ago, was attacked and bricked less than 24 hours after I
> installed it. I took it back and brought home a BEFSR41 which worked for
> many yers and could yet, all I would have to do is move the cables, but my
> web page would disappear because its NATed port forward capabilities
> aren't there. It is not dd-wrt.
>
> That is not to say that that a router cannot be hacked, but likely not by
> shellshock style attacks.
>
> That said, update-manager just popped up, and there is a 3rd bash update
> in the pipeline. Do the update now, and reboot. Only by rebooting can
> you be assured that every bash instance in your system is using the new
> one. I am doing it as soon as I've clicked on send.
Rebooting is NOT necessary for the bash update! Already runnins bash instances
are not relevant -- the bug only effects freshly spawned bash shells since the
bug is part of the bash start up. Once bash is running the bug has no effect.
Once /bin/bash has been updated, any future fork()s of /bin/bash will use the
updated (patched) /bin/bash. Of course, if the update updates the kernel or
libc or something like that, a reboot would be required.
>
> Cheers, Gene Heskett
--
Robert Heller -- 978-544-6933
Deepwoods Software -- Custom Software Services
http://www.deepsoft.com/ -- Linux Administration Services
heller at deepsoft.com -- Webhosting Services
More information about the ubuntu-users
mailing list