bash is not link layer. Put the mod_sec rules in and patch bash.

iptables can do pattern matching, but someone's already written the
mod_sec rules for you, and I suspect it has vastly better protocol
decoding capabilities.

(Sounds like more bash patches on the way according to Michal
Zalewski, so both mod_sec rules and patching are preferred rather than
either in isolation.)

cheers,
 Jamie

On 27 September 2014 17:28, John Crout <john.cr...@gmail.com> wrote:
> Are both if these true?
> Modsecurity is an Application layer firewall, and bash (any shell) is Link
> Layer?
>
> Maybe an iptables ruleset?
>
> John Crout
> - via phone
>
> On Sep 26, 2014 5:16 PM, "Joshua Roback" <jrob...@gmail.com> wrote:
>>
>> http://seclists.org/oss-sec/2014/q3/650
>>
>> https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
>>
>> http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html
>>
>> Has anyone come across a ModSec rule for this new CVE?
>>
>> --
>> Joshua Roback
>>
>> _______________________________________________
>> Owasp-modsecurity-core-rule-set mailing list
>> Owasp-modsecurity-core-rule-set@lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
>>
>
> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
>



-- 
Jamie Riden / ja...@honeynet.org / jamie.ri...@gmail.com
http://uk.linkedin.com/in/jamieriden
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to