Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <543408B5.3040602@redhat.com>
Date: Tue, 07 Oct 2014 17:37:25 +0200
From: Florian Weimer <fweimer@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Thoughts on Shellshock and beyond

On 10/07/2014 12:21 PM, Hanno Böck wrote:
>    What class of bug is Shellshock? "Weird feature invented in
>    pre-Internet era"? How do you conquer this class of bugs?

There are two bugs: Calling “eval” on untrusted input (a relatively 
common issue), and the fact that this particular code path should never 
have been exposed to the network at all.  The second part is not 
strictly a bash bug, even if we addressed that with a change in bash. 
If this issue had been discovered when the first CGI-enabled web server 
was implemented, maybe it would not have been called a bash bug, but a 
bug in how CGI used environment variables.

-- 
Florian Weimer / Red Hat Product Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.