Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Further flaws render Shellshock patch ineffective
Australian Business IT News ^ | Sep 29, 2014 10:19 AM (AUS) | Juha Saarinen

Posted on 09/29/2014 11:22:24 AM PDT by Utilizer

The Shellshock vulnerability in the commonly used Bash command line interpreter shell is likely to require more patches, as security researchers continue to unearth further problems in the code.

Google security researcher Michal "lcamtuf" Zalewski has disclosed to iTnews that over the past two days he has discovered two previously unaddressed issues in the Bash function parser, one of which is as bad as the original Shellshock vulnerability.

"The first one likely permits remote code execution, but the attack would require a degree of expertise to carry out," Zalewski said.

"The second one is essentially equivalent to the original flaw, trivially allowing remote code execution even on systems that deployed the fix for the initial bug," he added.

Common vulnerabilities and exposures numbers CVE-2014-6277 and CVE-2014-6278 have been assigned to the vulnerabilties.

(Excerpt) Read more at itnews.com.au ...


TOPICS: Computers/Internet
KEYWORDS: bash; patch; virus
More info at link, including unofficial patch link and another for technical analysis. Anyone familiar with the Shellshock vulnerability previously noted in this forum and the Bash CLI should at least glance at this.

(Note that the timestamp is in the Australian timezone)

1 posted on 09/29/2014 11:22:24 AM PDT by Utilizer
[ Post Reply | Private Reply | View Replies]

To: Utilizer
Meanwhile in Detroit.
2 posted on 09/29/2014 11:25:40 AM PDT by Daffynition ("We Are Not Descended From Fearful Men")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

3 posted on 09/29/2014 11:28:35 AM PDT by mc5cents ("Resistance to tyranny is obedience to God." - Thomas Jefferson)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Oy vey!

“At first sight, the potential for remote exploitation should be limited to CGI scripts that start with #!/bin/bash and to several other programs that explicitly request this particular shell. But there’s a catch: on a good majority of modern Linux systems, /bin/sh is actually a symlink to /bin/bash!

“This means that web apps written in languages such as PHP, Python, C++, or Java, are likely to be vulnerable if they ever use libcalls such as popen() or system(), all of which are backed by calls to /bin/sh -c ‘...’. There is also some added web-level exposure through #!/bin/sh CGI scripts, <!—#exec cmd=”...”> calls in SSI, and possibly more exotic vectors such as mod_ext_filter.

“For the same reason, userland DHCP clients that invoke configuration scripts and use variables to pass down config details are at risk when exposed to rogue servers (e.g., on open wifi). A handful of MTAs, MUAs, or FTP server architectures may be also of concern - in particular, there are third-party reports of qmail installations being at risk.”


4 posted on 09/29/2014 11:32:33 AM PDT by ConservingFreedom (A goverrnment strong enough to impose your standards is strong enough to ban them.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

ping...


5 posted on 09/29/2014 11:32:47 AM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them-)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; Ernest_at_the_Beach; ...

6 posted on 09/29/2014 11:39:00 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
However, given that the bash shell is written in Open Source (after all, it is part of UNIX), more complex fixes will probably be out within the next few days anyway. The likes of Red Hat and Canonical probably know how to implement these fixes, too.
7 posted on 09/29/2014 11:43:21 AM PDT by RayChuang88 (FairTax: America's economic cure)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Sloppy Web Site builders making it crap for everyone


8 posted on 09/29/2014 11:48:27 AM PDT by molson209 (Blank)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Daffynition

9 posted on 09/29/2014 11:55:34 AM PDT by Brother Cracker (You are more likely to find krugerrands in a Cracker Jack box than 22 ammo at Wal-Mart)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Utilizer; All

I understand that one of the machines at work has bash, and probably most Macs do.

But I also understand that if users haven’t changed the default security settings of their machines, and many (most?) users probably haven’t, then you’ve still got safety nets.

Insights welcome.


10 posted on 09/29/2014 12:09:30 PM PDT by Amendment10
[ Post Reply | Private Reply | To 1 | View Replies]

To: Amendment10
But I also understand that if users haven’t changed the default security settings of their machines, and many (most?) users probably haven’t, then you’ve still got safety nets.

For the most part, if you're not running a webserver, this isn't really an issue for you. You should go ahead and patch anyway, but there is no real urgency.

The vast majority of users don't have to worry about this bug on their own systems, except where the rogue DHCP servers come in.

11 posted on 09/29/2014 12:42:34 PM PDT by zeugma (The act of observing disturbs the observed.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: All

I looked about and couldn’t find any info but I was wondering how the Shellshock situation came about in the first place. Was it just bad/sloppy coding/design, a problem with the compiler, or something else?


12 posted on 09/29/2014 12:45:05 PM PDT by Proud_texan (Strange how paranoia can link up with reality now and then. - PK Dick)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Proud_texan

Previous post when we started discussing it here:

http://www.freerepublic.com/focus/f-chat/3209096/posts


13 posted on 09/29/2014 12:58:32 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them-)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Utilizer

Thanks, but that’s a link to this thread.


14 posted on 09/29/2014 1:03:34 PM PDT by Proud_texan (Strange how paranoia can link up with reality now and then. - PK Dick)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Proud_texan

Oops, sorry, let Me re-look it up then...


15 posted on 09/29/2014 1:07:45 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them-)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Proud_texan

I must run, but here are two previous threads that might help with some background:

1. http://freerepublic.com/focus/f-chat/3182001/posts

2. http://freerepublic.com/focus/f-chat/3142152/posts

Hope that helps. :)


16 posted on 09/29/2014 1:12:00 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them-)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Utilizer
No worries, I found the source at the gnu ftp side and it wasn't as nearly hard to follow as I expected (I was never a very good programmer to start with and it's been, uh, a "while"). It occurs to me that it's more of a syntactical peculiarity vs. any kind of "bug".

I honestly have no clue how any work gets done on a modern OS, just boggles my mind there are so many moving parts.

17 posted on 09/29/2014 1:16:01 PM PDT by Proud_texan (Strange how paranoia can link up with reality now and then. - PK Dick)
[ Post Reply | Private Reply | To 15 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson