You have been subscribed to a public bug by Marc Deslauriers (mdeslaur):

Binary package hint: bash

Attached is a shell script that was part of a security experiment of
mine showing that a fork bomb can be just as easily hidden in a shell
script as it can be executed in plain sight using a shell function.

My findings of this experiment are that the script can be crafted to
recursively and indefinitely execute instances of itself. This, unlike a
command that is run as a function in the shell, isn't visible to the
user unless opened in an editor. It can be given any name (even a
misleading one) and can be executed without the user knowing what's
lurking inside it.

It is also dangerous because the script itself can be crafted to perform
highly CPU-intensive tasks (or even delete files!) on top of exploding
into a million processes. We all know just how much damage this can
cause.

ProblemType: Bug
DistroRelease: Ubuntu 11.04
Package: bash 4.1-2ubuntu4
ProcVersionSignature: Ubuntu 2.6.37-8.21-generic 2.6.37-rc4
Uname: Linux 2.6.37-8-generic i686
Architecture: i386
Date: Sat Dec 11 22:33:24 2010
InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Alpha i386 (20101205)
ProcEnviron:
 LANG=en_US.utf8
 SHELL=/bin/bash
SourcePackage: bash

** Affects: bash (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: apport-bug i386 natty
-- 
Fork bombs can just as easily be coded into shell scripts as they can into bomb 
functions
https://bugs.launchpad.net/bugs/689176
You received this bug notification because you are a member of Ubuntu Bugs, 
which is a direct subscriber.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to