env x='() { :;}; echo vulnerable' bash -c 'echo hello'
if you are vulnerable, you get back:
vulnerable
hello
[doktor5000@Mageia4 ~]$ LC_ALL=C env x='() { :;}; echo vulnerable' bash -c 'echo hello'
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
hello
env x='() { :;}; echo vulnerable' bash -c 'echo hello'
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
hello
wintpe wrote:the bash vulnerability does not just affect mageia: redhat, centos, Solaris, HP-UX, AIX and cygwin just to name a few.
doktor5000 wrote:This is a good explanation of the vulnerability and affected areas: https://securityblog.redhat.com/2014/09 ... on-attack/
viking60 wrote:The "Internet of things" is mostly Linux driven and therefore bash driven.
doktor5000 wrote:Well, the IOT is probably more busybox-driven then anything else, so not directly bash, but ash ...
wintpe wrote:OK duplicate, i just cant delete it, sorry
doktor5000 wrote:Interesting proof of concept for this bash bug resulting in DoS: http://www.troyhunt.com/2014/09/everyth ... about.html
doktor5000 wrote:FWIW, the upstream patch is not complete, see https://bugzilla.redhat.com/show_bug.cgi?id=1141597#c27 and https://access.redhat.com/security/cve/CVE-2014-7169
For interim mitigation, see https://access.redhat.com/articles/1200223 (scroll down to the section "I heard that the patch for CVE-2014-6271 is incomplete. How can I mitigate this issue?")
The backslash bug <https://bugzilla.redhat.com/show_bug.cgi?id=1141597#c23> is NOT officially patched yet. No, we don't have a timeline.
doktor5000 wrote:bugreport for CVE-2014-7169: https://bugs.mageia.org/show_bug.cgi?id=14169
Although it seems that bash upstream says the issue is still not completely fixed ...
Return to Testing : Alpha, Beta, RC and Cauldron
Users browsing this forum: No registered users and 1 guest