|
Message-ID: <CALx_OUBmeDQS7i8BZYQoRO+TyhTWZhYDa0EXtrNbPoUQvNHQSg@mail.gmail.com> Date: Thu, 2 Oct 2014 08:04:24 -0700 From: Michal Zalewski <lcamtuf@...edump.cx> To: oss-security <oss-security@...ts.openwall.com> Cc: Shawn <citypw@...il.com> Subject: Re: more bash parser bugs (CVE-2014-6277, CVE-2014-6278) > According to shellshock test (https://shellshocker.net/shellshock_test.sh) That script is a weird mixture of tests that implicitly pay no attention to Florian's patch, and therefore do not really demonstrate any security risk: CVE20147186=$((bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' 2>/dev/null || echo "vulnerable") | grep 'vulnerable' | wc -l) ...ones that explicitly try to circumvent it in a way that makes them uninteresting from the security perspective: CVE20146271=$(env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo vulnerable' bash -c "echo test" 2>&1 | grep 'vulnerable' | wc -l) ...and ones that will fail with Florian's patch: CVE20147169=$((cd /tmp; rm -f /tmp/echo; env X='() { (a)=>\' bash -c "echo echo nonvuln" 2>/dev/null; [[ "$(cat echo 2> /dev/null)" == "nonvuln" ]] && echo "vulnerable" 2> /dev/null) | grep 'vulnerable' | wc -l) There are also some weird / duplicat entries and general confusion about which CVE stands for what, e.g.: CVE2014=$(env X=' () { }; echo hello' bash -c 'date' | grep 'hello' | wc -l) echo -n "CVE-2014-//// (exploit 3 on http://shellshocker.net/): " Really, just install the patch. The reasons for this, and a good test case to check if you're covered, are discussed here: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html If you want to learn a bit more about what these test cases are doing and why it matters, I have an earlier post here: http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html ...and last but not least, the details for the last two bugs are here: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html /mz
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.