Le 29/10/2014 16:54, Mark Martinec a écrit :
2014-10-29 16:26, Joe Acquisto-j4 wrote:
Comments on the ZD net article that claims shellshock exploit via
crafty SMTP headers?   Just asking, that's all . . .

I attached a link to it below, please excuse if that is improper
behavior.
  http://www.zdnet.com/shellshock-attacks-mail-servers-7000035094/

I have seen one such sample. Must be a really dumb mail delivery agent
or a content filter or a MUA that lets a mail header touch a shell.

Even my low-volume server has seen a few attempts, though the sending bots didn't follow proper SMTP protocol and were duly rejected by postscreen (not that they would have gotten anywhere near a shell anyway of course!). Curiously most appeared to be proof-of-concept testing rather than a true attack, as they were attempting to call /usr/bin/id

--
John

Reply via email to