Ned, I think you have under-estimated the severity, perhaps because of
stale information? (just a guess). Here's a good analysis of the bug from
Johannes Ullrich:
https://isc.sans.edu//#__utma=216335632.847683870.1411746865.1411746865.1411746865.1&__utmb=216335632.6.9.1411746895232&__utmc=216335632&__utmx=-&__utmz=216335632.1411746865.1.1.utmcsr=%28direct%29|utmccn=%28direct%29|utmcmd=%28none%29&__utmv=-&__utmk=203629779

Of note, I believe this sentence of yours is incorrect: " if you can both
manipulate the environment, *and* get bash to execute something else."

All that is needed is to change the HTTP request headers which are required
by spec to be converted into environment variables. If the CGI in question
is bash, this by itself is sufficient to get it to execute code that it
otherwise should not have.

I have setup my firewall to block on detection of this attempt.


On Fri, Sep 26, 2014 at 7:01 AM, Edward Ned Harvey (lopser) <
lop...@nedharvey.com> wrote:

> > From: Brandon Allbery [mailto:allber...@gmail.com]
> >
> > I haven't looked to see if Apple's "Web Sharing" involves any CGI
> scripts. If it
> > does, then Web Sharing is vulnerable.
>
> If you have any web server that will execute arbitrary code uploaded by a
> client, that would be vulnerable, but then again, if that's the case, the
> attacker doesn't need the bash bug anymore do they?
>
> The point of this bash bug is that it will execute code it's not supposed
> to execute, if you can both manipulate the environment, *and* get bash to
> execute something else.  This vulnerability is not sufficient, all by
> itself, to compromise anybody's system.  In order to use it as part of an
> attack, the attacker needs to chain multiple vulnerabilities together.
>
> Unlike heartbleed - which was vulnerable to undetected remote attackers
> having no other knowledge of any vulnerabilities on your system -
> shellshocker can't be exploited remotely without some other bug having
> compromised the system first.
>
> The reason people are calling this "worse than heartbleed" is because (a)
> sensationalism reporting, and (b) the number of systems with bash is higher
> than the number of systems with openssl.  But that number alone is
> misleading, because shellshocker is not as easily exploited.
> _______________________________________________
> Tech mailing list
> Tech@lists.lopsa.org
> https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
> This list provided by the League of Professional System Administrators
>  http://lopsa.org/
>
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to