Slashdot article 
http://linux.slashdot.org/story/14/09/24/1638207/remote-exploit-vulnerability-found-in-bash

  Story at 
http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html

  CVE ID CVE-2014-6271 at http://seclists.org/oss-sec/2014/q3/650

  Summary... bash scripts, CGI, perl via "system()", and various other
"commands" invoke a bash shell at times, passing environmental variables
in the process.  Problem is that an "environmental variable" ***CAN
CONTAIN A FUNCTION DEFINITION, AND EXECUTE IT WHILST SPAWNING A NEW
SHELL***.  E.g. execute the command...

env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

...and you get the following...

vulnerable
this is a test

  Replace...

x='() { :;}; echo vulnerable'

...with malicious stuff, and it could get ugly.  app-shells/bash-4.2_p48
has been pushed to Gentoo stable.  The same "env" command results in...

bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test


-- 
Walter Dnes <[email protected]>
I don't run "desktop environments"; I run useful applications

Reply via email to