Hi,
 thanks Chris for the explanation. That does help.

Cheers,
 Derek.
On 26/09/14 10:36, Chris Hellyar wrote:
Per what Steve said... Bash would be pretty uncommon on embedded devices, they tend to use busybox.

The current published/known exploit/vector from this is via apache, with cgi enabled and a cgi script using bash as it's interpreter.

so... a2dismod cgi on your deb/ubuntu boxes with apache, and whatever the equiv. is on RH, can't think of it for the mo.. That will fix that vector.

Or just not having any CGI scripts that use bash of course. (easier said than done if you run one of the hosting console tools like plesk etc per the other comments yesterday.

At this stage there doesn't appear to be another vector and it's useless as a local exploit anyway as it doesn't give you privilege escalation which is what you're looking for if you've already got access to a machine.

What it does do is allow you to remotely force the download of an arbitrary binary / script which can then have it's merry way with your box. There is chat on one of the darker shaded IRC channels about delivering the spike ddos toolkit via shellshock, which if you were of that persuasion might not be a had way to go.

Cheers, Chris H.


On 26/09/14 10:01, Derek Smithies wrote:
Chris,
 thankyou for stating what can be achieved with minimal effort..

So - is my ADSL box exploitable - which has linux inside it?
presumably not - my ADSL box refuses html and ssh login access from the wild.

Yes - it might be, if someone inside my network does html access to the box and somehow gets to a shell with some buffer overrun attack.

So - does this mean that any web server (which is subject to buffer overrun attacks) that eventually leads to shell access is vulnerable?

However, in these days of better code/ standard string types that don't have overrun issues/ python servers/ how much is overrun a problem?

Noone on this list is involved in hacking to destroy a remote web server, but we do have an interest in getting our servers secure. So when testing a server, what are the things (in the light of this exploit) that one could do to get into the box? Since one knows how to get in, one
knows how to secure it.

==================================

My problem is that I read reviews on the net, and wonder
   a)how factual it is
b)how much the author is hyping the reports to get a higher page hit rate and get more dollars from the advertisers
   c)how much the author hates unix/linux.

Thanks,
 Derek.


On 26/09/14 09:42, Chris Hellyar wrote:
0918 this morning Debian released a patch for the patch.  :-)

For those not watching this is great viewing.

It's also quite scary how easy it was to build an exploit for this one. It took me about 15 minutes last night to build a shell script that could exploit a bash script on a remote server to download and execute arbitrary script/executable on the target machine.

The last few major ones it's taken at least a few hours hunting around for source and preconditioning / setup would normally take multiple scripts. This one is single script, no set up required.

Cheers, Chris H.
_______________________________________________
Linux-users mailing list
[email protected]
http://lists.canterbury.ac.nz/mailman/listinfo/linux-users


_______________________________________________
Linux-users mailing list
[email protected]
http://lists.canterbury.ac.nz/mailman/listinfo/linux-users

--
Sent from my Ubuntu computer

_______________________________________________
Linux-users mailing list
[email protected]
http://lists.canterbury.ac.nz/mailman/listinfo/linux-users

Reply via email to