Hi All,

I'm sure you've all heard about the bash vulnerability where:
*"specially-crafted
environment variables can be used to inject shell commands" unearthed
by Stephane
Chazelas very recently?.

Many linux flavors have already released patches and according to the
following test (see in full at:
https://access.redhat.com/articles/1200223) Solaris
10 at least appears to be vulnerable.

=========================
Diagnostic Steps

To test if your version of Bash is vulnerable to this issue, run the
following command:

$ env x='() { :;}; echo vulnerable'  bash -c "echo this is a test"

If the output of the above command looks as follows:

vulnerable
this is a test

you are using a vulnerable version of Bash. The patch used to fix this
issue ensures that no code is allowed after the end of a Bash function.
Thus, if you run the above example with the patched version of Bash, you
should get an output similar to:

$ env x='() { :;}; echo vulnerable'  bash -c "echo this is a test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test

=========================


Does anyone know if there is, or is planned, a patch for Solaris' bash
implementation?.


*
https://access.redhat.com/security/cve/CVE-2014-6271?sc_cid=70160000000e8eaAAA&;

-- 
Cheers,

Tony.
                            \|/ ____ \|/
                             @~/ ,. \~@
                            /_( \__/ )_\
+------------------------------\__U_/----------------------------------+
_______________________________________________
msosug mailing list
[email protected]
http://mexico.purplecow.org/m/listinfo/msosug

Reply via email to