On 09/25/14 15:29, Edward Ned Harvey (lopser) wrote:
From: tech-boun...@lists.lopsa.org [mailto:tech-boun...@lists.lopsa.org]
On Behalf Of Yves Dorfsman

What do you guys do for your OS X non-techincal users?

Give them instructions on how to update bash manually?
Give them instructions on how to close port 22 and 80 when using public wifi?

Anybody has any idea when Apple might release a proper patch?
My opinion:  The only way to exploit the bug is to *first* run some malicious 
code that would tweak your environment such that the bug is then being 
exploited.  In other words, this bug doesn't expose users to risk of simply 
browsing a malicious website accidentally and compromising your system; this 
bug is a trojan backdoor that needs to first execute some malicious code on 
your system in order to expose the backdoor.

Yes it's a bug to be taken seriously, no I don't recommend building your own 
patched bash.  For three reasons:

#1  Suppose you patch bash, and then apple releases an update.  What will be 
the behavior of their updater when it sees your nonstandard binary?  I have 
seen times when the updater would clobber a nonstandard file, and I've seen 
times when the updater refuses to operate because there's a nonstandard file 
sitting there.  I simply cannot say how apple's updater would behave in this 
specific scenario.

#2  Even if you patch it, I don't think they've released fully patched source 
code yet for bash.  They have instructions to build an updated bash, but it's 
still subject to another variant of the same bug.  I am reasonably certain that 
as soon as *fully* patched bash source code is available, apple will build it 
and distribute it.

#3  In order to exploit this bug, the attacker must execute some malicious code 
on your system *first*, or modify core system files on your system *first*.  If 
they can do that, they could exploit this bash backdoor, or any one of numerous 
other possible backdoors.

It's not as simple (or accurate) as that. dhclient that runs on your machine to pick up IP addresses from a dhcp server runs as root, and uses bash directly (regardless of what yours or roots shell is). I don't know what OS X does specifically/, /if they're running a patched version of dhclient or similar that doesn't explicitly call root.

DHCP servers can pass out environment variables for end hosts to use. It's a standard configuration thing for dhcp servers, and very easy to set up. So potentially if connect to a public wifi endpoint, or your router is compromised (and there are people actively attacking routers to set this up), your machine could end up being compromised just because it asked for an IP address.

That's just /one /attack vector that doesn't require direct access or an existing compromise on a machine. It's very likely there are other tools that call bash directly on your machine and some of them might do as part of very normal processes that you wouldn't even think of.

Now take a guess at 1) how many people patch their routers regularly, and 2) how many router companies actually bother to patch their equipment, 3) how many people have routers that are EOL and not receiving patches anyway.

In general I would encourage people to be *very* cautious until they know that the version of bash on their machine has been patched. Given that today they're still finding ways the patches aren't working (http://seclists.org/oss-sec/2014/q3/741), we're most definitely not out of the woods yet.

Paul
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to