3

I read some articles (article1, article2, article3) about the Shellshock Bash bug (CVE-2014-6271 reported Sep 24, 2014) and have a general idea of what the vulnerability is and how it could be exploited. To better understand the implications of the bug, what would be a simple and specific example of how some software could exploit the bug?

Peter Mortensen
  • 30,738
  • 21
  • 105
  • 131
Rob Bednark
  • 25,981
  • 23
  • 80
  • 125
  • You should ask on [Information Security](http://security.stackexchange.com/) – glenn jackman Sep 25 '14 at 00:09
  • This question appears to be off-topic because it is about security and as such is better suitable for http://security.stackexchange.com – Eugene Mayevski 'Callback Sep 25 '14 at 06:22
  • 3
    For others looking for this info (and maybe seeing this as the first hit in Google): http://security.stackexchange.com/questions/68122/what-is-a-specific-example-of-how-the-shellshock-bash-bug-could-be-exploited. I also found http://blog.erratasec.com/2014/09/bash-bug-as-big-as-heartbleed.html a helpful reference. – lennartcl Sep 25 '14 at 07:05
  • This is how to install the ‪#‎ShellShock‬ bug patch in ‪#‎Ubuntu‬. First, run this on your shell prompt: $ env var='() { ignore this;}; echo vulnerable' bash -c /bin/true If you are vulnearble, it echos 'vulnerable'. If you are vulnerable, simply update with aptitude-get and install bash using these commands: $ sudo apt-get update $ sudo apt-get install bash – fasholaide Sep 25 '14 at 15:59
  • There are plenty of reports of attempted exploits in the wild; see for instance http://blog.sucuri.net/2014/09/bash-shellshocker-attacks-increase-in-the-wild-day-1.html – Charles Duffy Sep 26 '14 at 16:09
  • ...basically, just throw exploit code in an HTTP header; if that header is exported to the environment (as is done in CGI) and anything calls a shell (and badly-written code that shells out is pretty damned common, especially in the PHP world), then there you are. – Charles Duffy Sep 26 '14 at 16:10

0 Answers0