Page 1 of 1

Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 2:29 pm
by Cyborg Girl
I know what you're thinking: "Of course a command shell is vulnerable, that's why you don't provide remote access to it."

Unfortunately, on Linux, web services and other stuff depend on the command shell being secure...

http://seclists.org/oss-sec/2014/q3/650
http://unix.stackexchange.com/questions ... shellshock

Anything that exports an environment variable can force the bash command shell to execute arbitrary code upon loading that variable. And lots and lots and lots of software uses environment variables. So lots and lots and lots of software suddenly has massive remote vulnerabilities; because the local program that provides the command line interface, and should never even be accessible from a web service, does something that it should be pretty much expected to do.

But remember, folks, this is the World's Most Robust OS.

(However, expect squid to step in and correct me in 3... 2... 1...)

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 4:24 pm
by Sigma_Orionis
Wonderful

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 4:52 pm
by squ1d
You can't be that confident about what you're saying if you expect to be corrected :o

If Linux is the world's most robust OS then I'm a hungarian parking attendant.

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 4:59 pm
by Rommie
O, te is magyar vagy? Nagyszeru! :P

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 5:22 pm
by Cyborg Girl
squ1d wrote:You can't be that confident about what you're saying if you expect to be corrected :o


It's become a bit of a pattern lately... ;)

If Linux is the world's most robust OS then I'm a hungarian parking attendant.


"I saw it on a website with 'Business' in its name, so it must be true!"

http://www.businessinsider.com/linus-to ... 014-6?op=1

Edit: more seriously, I've found the Linux kernel quite reliable (despite all my complaints) but I still see a lot of ridiculous hype about how awesome Linux is.

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 5:30 pm
by FZR1KG
There is a disturbing trend of people writing about shit they have no clue about but coming off as experts to the unwary.
Problem is of course many get suckered till they find out the facts.
Others however just read the garbage, take it as gospel then regurgitate the same false information, sometimes getting paid to do it.

e.g. The Free XP on windows 8 topic. One guy found a way to get XP running on Windows 8, but, it's free for a month then you have to activate it.
Regardless of the amount of people I've found that have proven this is the case, they just keep repeating the same shit everywhere.
Then there are discussion of how it comes with a key...but the key doesn't work.

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 5:38 pm
by Sigma_Orionis
NIST gave it a rating of 10.0 can't get any worse than that.

On top of that, the patches provided don't fix the whole thing there's a new NIST advisory about it.

This IS a big one, and I agree It's much worse than Heartbleed.

Why is it much worse?

because unlike Heartbleed it's a lot easier to exploit and affects as many or more systems as Heartbleed

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 5:47 pm
by Cyborg Girl
@FZ: Ha, irony! "Shit I have no clue about" probably describes 90% of my posts on web forums.

(More seriously, there is not a single day at work when I actually really feel like I know what I'm doing. It's all entirely by the seat of my pants, all day, every day. The only thing I'm an expert at is Googling.)

@Sigma: yeah, I saw that. :( For the moment we're all SOL. Sigh.

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 5:56 pm
by FZR1KG
Just remember, it's not always fluff. Sometimes you might hit one that's true.
about 10% or less of the time :P

According to Sigma, this one may just be real.

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 6:16 pm
by Sigma_Orionis
Fortunately none of my Internet facing stuff has any stuff that needs BASH on it. My web servers either run IIS or Weblogic,
I'm waiting for the BASH developers to make a good enough fix and then it's patching time for at least 20 servers. MEH.

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Sep 25, 2014 6:19 pm
by Sigma_Orionis
Rommie wrote:O, te is magyar vagy? Nagyszeru! :P



Ai don sink zo! :P

Re: Remote vulnerability in Linux command shell

PostPosted: Fri Sep 26, 2014 7:04 pm
by Cyborg Girl
I love where this vulnerability crops up though. I mean, web servers! DHCP clients! Wow!

It's only one of the primary rules of UNIX security that you never ever hand unsanitized data from untrusted sources off to the command shell, because the shell may be fooled into doing anything with it. I have a book on shell scripting with a whole chapter basically devoted to this, and you can find documentation about it everywhere, e.g. Perl textbooks telling you to use

system qw(/path/to/command arg1 arg2 ...)

instead of

system("/path/to/command arg1 arg2 ...")

in privileged scripts, because the latter runs the command via the shell, which usually means someone could get an interactive root shell with a little cleverness.

The "shellshock" vulnerability is that bash can be made to execute stuff in an environment variable. But to export an environment variable to bash, you have to actually run bash. Which a web server should never do by design, but Apache (on UNIX) does just that apparently.

Re: Remote vulnerability in Linux command shell

PostPosted: Fri Sep 26, 2014 8:09 pm
by Cyborg Girl
The circus continues:

http://seclists.org/oss-sec/2014/q3/741

Fedora 20 is not vulnerable to the new variant. Ubuntu 12.04 is. Not sure yet about 14.04.

@Sigma, I hope you have some antacids on hand... As for me, I'm thinking maybe I should train for a different job. I hear that goat herding isn't bad...

Re: Remote vulnerability in Linux command shell

PostPosted: Thu Nov 13, 2014 11:56 pm
by Sigma_Orionis
Most of my stuff is patched already, still looking for a maintenance window for my VMWARE hosts, because patching the command interpreter requires a reboot :roll: