[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [FD] Critical bash vulnerability CVE-2014-6271
- To: Tim <tim-security@xxxxxxxxxxxxxxxxxxx>
- Subject: Re: [FD] Critical bash vulnerability CVE-2014-6271
- From: Paul Vixie <paul@xxxxxxxxxxx>
- Date: Thu, 25 Sep 2014 13:54:31 -0700
> Tim <mailto:tim-security@xxxxxxxxxxxxxxxxxxx>
> Thursday, September 25, 2014 1:06 PM
>
>
> If you change the default shell from bash to a more sane one[1], like
> dash or ash, does this attack disappear?
no. the problem occurs when /bin/sh is bash, or when a network invokable
script begins with the line #!/bin/bash. it has nothing to do with the
user's shell. rather, it's the shell used by popen() and system() and of
course (execl, execlp, execle, execv, execvp, execvpe), or, it's the
explicitly called shell named at the top of the script itself.
> I would assume so, but
> sometimes foolish packages directly reference /bin/bash in the #!
> header. (I notice some dhclient shell script hooks don't make an
> explicit reference at all, while others reference /bin/sh.)
some scripts really do depend on bash's extensions. the dhclient hook is
particularly bad about that, since it uses the environment to pass
parameters that are set by the DHCP server (or a miscreant pretending to
be one).
--
Paul Vixie
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/