TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Bad news about Shellshock

29 pointsby hkr_magover 10 years ago

3 comments

thaumaturgyover 10 years ago
Woah. This is getting blown a <i>little</i> out of proportion now. It&#x27;s a bad bug, but we don&#x27;t need a bunch of misinformation about it:<p>1. The released patch (and subsequent update for many distributions) fixed the only currently-known remotely exploitable version of the bug. The cases found afterward are a different bug, and so far there&#x27;s no publicly known way to remotely exploit it. These other bugs were published to demonstrate that there are deeper flaws in bash&#x27;s parsing of environment variables. If you have updated bash with the most recent fix, the odds are in your favor that you&#x27;re going to be just fine.<p>2. &quot;Routers, web cameras, SIP gateways, NAS’s&quot; &amp; etc. all need to be running a variant of bash to be exploitable. dash doesn&#x27;t have this problem. ksh, csh, other shells don&#x27;t have this problem. ash, used by BusyBox, doesn&#x27;t have this problem. BSD-based systems don&#x27;t have this problem (except in rare circumstances).<p>3. DHCP exploitation requires that you have network-start scripts that are run by bash on your system, <i>and</i> you&#x27;re getting DHCP from a compromised host.<p>4. Yes, ssh hosts are vulnerable -- <i>if</i> you already have ssh access to those hosts and your shell is bash. This bug doesn&#x27;t give most users a level of access that they don&#x27;t already have. But, it can mean that if a user is restricted to specific commands for sudo without being prompted for a password, then they can run arbitrary sudo commands, which isn&#x27;t very nice.<p>5. And yeah, mass-scanning started late last night and the first examples of malware using this as a vector are being seen. As scanning techniques improve -- currently they&#x27;re pretty rudimentary -- more and more hosts will get compromised.<p>Keep calm and update bash.
kazinatorover 10 years ago
The parsing of environment variables to produce functions should be disabled int bash by default, unless a loud and clear command line option is given to request the behavior, like &quot;bash --hit-me-with-environment-variable-stupidity-please&quot;.<p>Furthermore, perhaps it should only work on environment variables in a loud an clear namespace like __bash_func_foo=&quot;() { whatever }&quot; produces a function called &quot;foo&quot;. A variable not in this namespace like TERM or REQUEST_URL is not scanned for this function-defining syntax under any circumstances.<p>Lastly, perhaps the target functions should be in a namespace themselves, making it impossible to pass down a function called &quot;echo&quot; or &quot;ls&quot;. For instance only functions with the &quot;if_&quot; prefix (&quot;inheritable function&quot;) could be subject to inheritance. Don&#x27;t like the ugly prefix? Then write your shell application so that every new execution of a script sources all the code it needs from files. Or write your personal scripts so that they use a repository of functions in your ~&#x2F;.bashrc rather than passing functions down among themselves. Or use local aliases for the ugly prefixed names.
评论 #8370564 未加载
评论 #8370567 未加载
jewelover 10 years ago
&gt; There is still no working patch.<p>Is this still true? On Ubuntu we got another update today:<p><pre><code> * SECURITY UPDATE: incomplete fix for CVE-2014-6271 - debian&#x2F;patches&#x2F;CVE-2014-7169.diff: fix logic in parse.y. - CVE-2014-7169 -- Marc Deslauriers &lt;marc.deslauriers@ubuntu.com&gt; Thu, 25 Sep 2014 02:06:49 -0400</code></pre>
评论 #8370558 未加载
评论 #8370505 未加载