(Sorry, this is not strictly DNS, but I would guess that this is the cause of this shell-shock vector).

When looking at the code for libc I was most disappointed to see that "/bin/sh" is hard coded for both "popen()" and "system()"

Where as I had previously assumed that the environment variable SHELL could override this.

As "/bin/sh" is almost always a symlink to "/bin/bash", and many O/S scripts assume this to be the case (i.e. use bash specific features, without declaring "#!/bin/bash"), so simply making "/bin/sh" a link to (say) "/bin/ash" is probably not an option.


So heads-up to any systems that use "popen()" or "system()" but have not had bash upgraded - they may also have vulnerabilities.

IMHO, these two vectors mean shellshock will provide all sorts of unexpected opportunities, until everybody is upgraded.



On 14/10/14 08:00, Stephane Bortzmeyer wrote:
Funny: an OS sends the result of some DNS queries to bash, allowing
the DNS operator to attack DNS clients with ShellShock:

http://packetstormsecurity.com/files/128650

What about an evil AS 112 operator attacking 168.192.in-addr.arpa
users?
_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to