Go Back   IceInSpace > Equipment > Software and Computers
Register FAQ Calendar Today's Posts Search

Reply
 
Thread Tools Rate Thread
  #1  
Old 25-09-2014, 04:26 PM
gary
Registered User

gary is offline
 
Join Date: Apr 2005
Location: Mt. Kuring-Gai
Posts: 5,999
Exclamation US-CERT - Bourne Again Shell (Bash) Remote Code Execution Vulnerability

US-CERT has posted a warning of an exploit affecting the use of the Bash shell.

See https://www.us-cert.gov/ncas/current...-Vulnerability

See http://www.smh.com.au/it-pro/securit...25-10ltx1.html

Linux, UNIX and Mac OS X users should upload fixes for their respective
operating systems.

At the time of posting, Apple have yet to make an announcement nor provide a fix.

Fixes are now available for all major Linux distributions.
Reply With Quote
  #2  
Old 25-09-2014, 04:40 PM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
Thanks for the heads up, Gary!
Reply With Quote
  #3  
Old 25-09-2014, 04:49 PM
lazjen's Avatar
lazjen (Chris)
PI cult member

lazjen is offline
 
Join Date: Dec 2012
Location: Flaxton, Qld
Posts: 2,078
Note that the first round of patches may not fully solve the problem -allegedly. There's probably going to be another round to come sometime.
Reply With Quote
  #4  
Old 26-09-2014, 09:28 AM
mithrandir's Avatar
mithrandir (Andrew)
Registered User

mithrandir is offline
 
Join Date: Jan 2009
Location: Glenhaven
Posts: 4,161
Interesting. I only got my US-CERT notification this morning.

Picked up the bash-018 patch (the relevant one for me) last night and recompiled.

Cygwin doesn't seem to have released an updated bash yet.
Reply With Quote
  #5  
Old 26-09-2014, 11:40 AM
Octane's Avatar
Octane (Humayun)
IIS Member #671

Octane is offline
 
Join Date: Dec 2005
Location: Canberra
Posts: 11,159
Oracle's had a placeholder for the CVE since yesterday afternoon. I've been put in charge of patching our systems here; 54 of which are under my direct jurisdiction. Argh!

H
Reply With Quote
  #6  
Old 26-09-2014, 01:25 PM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,080
Currently Apple has plenty on their plate with bending not bashing.
Reply With Quote
  #7  
Old 26-09-2014, 04:02 PM
mithrandir's Avatar
mithrandir (Andrew)
Registered User

mithrandir is offline
 
Join Date: Jan 2009
Location: Glenhaven
Posts: 4,161
Quote:
Originally Posted by multiweb View Post
Currently Apple has plenty on their plate with bending not bashing.
Groan
Reply With Quote
  #8  
Old 26-09-2014, 04:13 PM
mithrandir's Avatar
mithrandir (Andrew)
Registered User

mithrandir is offline
 
Join Date: Jan 2009
Location: Glenhaven
Posts: 4,161
From SANS a few hours ago. While he says LINUX, it should say any system using the bash shell.

Quote:
SANS FLASH REPORT: The Shellshock vulnerability: What you should do now.

September 25, 2014

Shellshock merits this FLASH report because it is so widespread and so easy to exploit on systems like your firewalls and web servers and other similarly important servers running LINUX.

Johannes Ullrich, Director of SANS Internet Storm Center just updated a brief webcast to provide authoritative answers to the five questions we are being asked:
1. How important is Shellshock (which specific types of systems can actually be exploited now)?
2. What is the primary way that this vulnerability is being exploited?
3. What went wrong? Where did the vulnerability come from?
4. How can you find out which of your systems are vulnerable? and How easy it is for attackers to find the vulnerable systems on your network?
5. How can you protect yourself?

You can see the slides and listen to his briefing at: https://isc.sans.edu/forums/diary/We...rability/18709

Storm Center has also posted a FAQ which is being updated as new data is found: https://isc.sans.edu/forums/diary/Up...llshock+/18707

Alan Paller, Director of Research, SANS institute apaller at sans.org
Reply With Quote
  #9  
Old 27-09-2014, 06:10 PM
GeoffW1's Avatar
GeoffW1 (Geoff)
Registered User

GeoffW1 is offline
 
Join Date: Sep 2006
Location: Sydney
Posts: 1,847
Quote:
Originally Posted by multiweb View Post
Currently Apple has plenty on their plate with bending not bashing.
Reply With Quote
  #10  
Old 29-09-2014, 02:23 PM
gary
Registered User

gary is offline
 
Join Date: Apr 2005
Location: Mt. Kuring-Gai
Posts: 5,999
Another article on the bash exploit in today's Sydney Morning Herald :-
http://www.smh.com.au/it-pro/securit...29-10nerp.html

The link Andrew provided contains a test (see snippet below) :-
https://isc.sans.edu/forums/diary/Up...llshock+/18707

Code:
The US-CERT's advisory includes a simple command line script that bash
users can run to test for the vulnerability. To check your system
from a command line, type or cut and paste this text:

env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If the system is vulnerable, the output will be:

vulnerable 
 this is a test

An unaffected (or patched) system will output:

bash: warning: x: ignoring function definition attempt 
 bash: error importing function definition for `x' 
 this is a test
Reply With Quote
  #11  
Old 29-09-2014, 02:27 PM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,080
Quote:
Originally Posted by gary View Post
Another article on the bash exploit in today's Sydney Morning Herald :-
http://www.smh.com.au/it-pro/securit...29-10nerp.html

The link Andrew provided contains a test :-
https://isc.sans.edu/forums/diary/Up...llshock+/18707

Code:
The US-CERT's advisory includes a simple command line script that bash
users can run to test for the vulnerability. To check your system
from a command line, type or cut and paste this text:

env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If the system is vulnerable, the output will be:

vulnerable 
 this is a test

An unaffected (or patched) system will output:

bash: warning: x: ignoring function definition attempt 
 bash: error importing function definition for `x' 
 this is a test
Thanks for that Gary. Doesn't seem to affect FreeBSD.
Reply With Quote
  #12  
Old 29-09-2014, 02:38 PM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
We had an exciting weekend testing new firmware releases. Fortunately, it's mostly automated.

Cheers,
Rick.
Reply With Quote
  #13  
Old 29-09-2014, 03:01 PM
Octane's Avatar
Octane (Humayun)
IIS Member #671

Octane is offline
 
Join Date: Dec 2005
Location: Canberra
Posts: 11,159
I've been patching today.

What a sneaky little bugger.

H
Reply With Quote
  #14  
Old 29-09-2014, 03:04 PM
mithrandir's Avatar
mithrandir (Andrew)
Registered User

mithrandir is offline
 
Join Date: Jan 2009
Location: Glenhaven
Posts: 4,161
Quote:
Originally Posted by multiweb View Post
Thanks for that Gary. Doesn't seem to affect FreeBSD.
Could be, but does FreeBSD use bash by default, or some other shell?

Some *nixes provide bash but it is not the default shell. That includes a couple of Linux versions. What is the shell field in:

grep $USER /etc/passwd

I got used to typing (or putting in profile scripts):

which bash && exec bash -l


Quote:
Originally Posted by Octane View Post
I've been patching today.

What a sneaky little bugger.
Enjoy H. You'll get to do it again in a few days, maybe weeks, when they work out the fix for CVE-2014-7169
I see that a couple more patches were released over the weekend. I've installed and these protect against the 7169 test:

env X='() { (a)=>\' bash -c "echo date";

Last edited by mithrandir; 29-09-2014 at 03:57 PM.
Reply With Quote
  #15  
Old 29-09-2014, 03:53 PM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,080
Quote:
Originally Posted by mithrandir View Post
Could be, but does FreeBSD use bash by default, or some other shell?
right... csh so C shell?
Reply With Quote
  #16  
Old 29-09-2014, 04:10 PM
mithrandir's Avatar
mithrandir (Andrew)
Registered User

mithrandir is offline
 
Join Date: Jan 2009
Location: Glenhaven
Posts: 4,161
Quote:
Originally Posted by multiweb View Post
right... csh so C shell?
Yep. csh == "C Shell". There's also tcsh - a somewhat smarter version of csh. One might be a symlink to the other.

My Linux has a choice of:

/bin/ash*
/bin/bash*
/bin/csh -> tcsh*
/bin/ksh*
/bin/rksh -> ksh*
/bin/sh -> bash*
/bin/tcsh*
/bin/zsh*
Reply With Quote
  #17  
Old 29-09-2014, 05:04 PM
lazjen's Avatar
lazjen (Chris)
PI cult member

lazjen is offline
 
Join Date: Dec 2012
Location: Flaxton, Qld
Posts: 2,078
Be careful - even if your defaults aren't bash, if you've got bash installed, some other parts may use bash anyway.
Reply With Quote
  #18  
Old 02-10-2014, 11:16 PM
mithrandir's Avatar
mithrandir (Andrew)
Registered User

mithrandir is offline
 
Join Date: Jan 2009
Location: Glenhaven
Posts: 4,161
Here we go again - patch, rebuild, reinstall.

More bash patches released Oct 1st.
Reply With Quote
  #19  
Old 03-10-2014, 10:57 AM
Octane's Avatar
Octane (Humayun)
IIS Member #671

Octane is offline
 
Join Date: Dec 2005
Location: Canberra
Posts: 11,159
I was halfway through patching our Solaris 10 fleet and Oracle released a newer patch that also resolved another half-a-dozen CVEs, including 7169. So, the last few days have been pretty much nothing but patching and testing.

I hope to finish off today and then do it again in a few weeks when more patches are released.

H
Reply With Quote
  #20  
Old 07-10-2014, 12:14 PM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,080
Bash vulnerability example

Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +10. The time is now 01:06 AM.

Powered by vBulletin Version 3.8.7 | Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Advertisement
Astrophotography Prize
Advertisement
Bintel
Advertisement