'Shellshock Threatens 500M Computers (Linux, MacOSX)
Ron Czapala
Posts: 2,418
http://finance.yahoo.com/news/heartbleed-shellshock-threatens-500m-computers-194100743.html
http://gizmodo.com/why-the-shellshock-bash-bug-could-be-even-worse-than-he-1639047786
http://www.zdnet.com/first-attacks-using-shellshock-bash-bug-discovered-7000034044/
http://www.cnet.com/news/bigger-than-heartbleed-bash-bug-could-leave-it-systems-shellshocked/
http://www.wired.com/2014/09/internet-braces-crazy-shellshock-worm/
The main problem is the location of the vulnerability a small piece of software called Bash, which stands for Bourne-Again SHell. Bash is a fundamental element of many Unix-based operating systems including many Linux distributions and Mac OSX. Its the terminal where commands that are issued for controlling the system installing software, monitoring networks, and executing code are run.
If youre on a Windows box, youre not out of the woods, either. The servers of most sites that you visit run on Apache, which, as youve probably guessed by now, also uses Bash.
http://gizmodo.com/why-the-shellshock-bash-bug-could-be-even-worse-than-he-1639047786
http://www.zdnet.com/first-attacks-using-shellshock-bash-bug-discovered-7000034044/
The good news yesterday that some Linux distributions shipped patches for the bug yesterday has already been tempered by the discovery that those patches only partially dealt with potential attacks. In an update overnight, Red Hat said that it was developing a new patch, however, it is still advising users to apply the incomplete one for now
http://www.cnet.com/news/bigger-than-heartbleed-bash-bug-could-leave-it-systems-shellshocked/
http://www.wired.com/2014/09/internet-braces-crazy-shellshock-worm/
Because Shellshock is easy to exploitit only takes about three lines of code to attack a vulnerable serverLackey and other security experts think theres a pretty good chance that someone will write a worm code that will jump from vulnerable system to vulnerable system, creating hassles for the worlds system administrators. People are already exploiting it in the wild manually, so a worm is a natural outgrowth of that, Lackey says.
To exploit the bug, the bad guys need to connect to software such as PHP or DHCPwhich use bash to launch programs within the servers operating system
Comments
Ah, no worries. It's fixed in Debian already. Even on the Raspebrry Pi. Debian Jessie is still vulnerable but that's not suppose to be on production machines.
It's shocking how fast those guys fix this kind of stuff:)
Let's hope it gets squashed quickly.
http://www.itnews.com.au/News/396197,first-shellshock-botnet-attacks-akamai-us-dod-networks.aspx#ixzz3EQsWZWQ0
First Shellshock botnet attacks Akamai, US DoD networks
How to tell if you're vulnerable
http://www.pcmag.com/article2/0,2817,2469299,00.asp?kc=PCRSS03069TX1K0001121
What I don't understand is where are these shell scripts that can be attacked?
On every web server I have ever worked with there was no shell scripting being used anywhere.
I have to update Linux?
http://finance.yahoo.com/news/apple-says-shellshock-no-risk-145927782.html
https://ca.finance.yahoo.com/news/trend-micro-launches-free-protection-175300921.html
Amazing! Just a couple of hours ago I was reading how this is not fixed in Debian Jessie. But BOOM there it is job done. That is shocking if you compare to how long it took to fix the old "Code Red" problem.
https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/
The Apache link is that if you call _any_ URL which runs any kind of cgi script, then Apache executes bash to provide environment variables. And that's where it is easy (before the patch) to get it to run any executable. Amazing really. I tried that when I secured a couple of web servers back home (the good thing about being a backup admin in a time zone 7 hours ahead is that I can jump in when the company is still at sleep). A curl one-liner.