Because of its wide distribution, the vulnerability could be as
wide-ranging as the Heartbleed bug, though it may not be nearly as dangerous. The vulnerability affects versions 1.14 through 4.3 of GNU Bash. Patches have been issued by many of the major Linux distribution vendors
for affected versions, including:
Seems to be almost everywhere. I'd suggest trying to patch this up
real quick.
Subject: Re: Bash exploit in the wild
Thanks for the heads up! Fortunately, my Archlinux VM was updated yesterday and must have come with that patch. I remember bash being upgraded, and I get the second (non-vulnerable) result when I type that command in.
■ Synchronet ■ Decker's Heaven -//- bbs.deckersheaven.com[Psi-Jack -//- Decker]
Seems to be almost everywhere. I'd suggest trying to patch this up real
quick.
I wonder how many sites are running bash CGI scripts? I remember writing a few quick and dirty BASH scripts back in the day.
I wonder how many sites are running bash CGI scripts? I remember writing a few quick and dirty BASH scripts back in the day.
From what I understand it affects more than just bash scripts. For example a perl/php script doing `some_command` may be vulnerable as well if the some_command gets executed via bash.
Heh, I noticed that too. I had seen the alert pretty much day 1 of it's report and noticed Arch was already patched, and quite amazed about how quickly they did it. Heck, they did it faster than CentOS/RHEL, which by itself is pretty dang quick.
i'm not so sure it's as bad as heartbleed, though.
Re: Re: Bash exploit in the wild
By: Psi-Jack to Access Denied on Fri Sep 26 2014 11:09 am
Heh, I noticed that too. I had seen the alert pretty much day 1 of
it's report and noticed Arch was already patched, and quite amazed
about how quickly they did it. Heck, they did it faster than
CentOS/RHEL, which by itself is pretty dang quick.
The initial patch doesn't completely close the hole... just a heads-up.
■ Synchronet ■ Decker's Heaven -//- bbs.deckersheaven.com[Psi-Jack -//- Decker]
The initial patch doesn't completely close the hole... just a
heads-up.
Hmmm, what's missing in it, and got any resources on that?
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4236
I wonder how many sites are running bash CGI scripts? I remember writing a few quick and dirty BASH scripts back in the day.
From what I understand it affects more than just bash scripts. For example a perl/php script doing `some_command` may be vulnerable as well if the some_command gets executed via bash.
The initial patch doesn't completely close the hole... just a heads-up.
Thanks for the heads up! Fortunately, my Archlinux VM was updated
yesterday and must have come with that patch. I remember bash
being upgraded, and I get the second (non-vulnerable) result when
I type that command in.
Heh, I noticed that too. I had seen the alert pretty much day 1 of
it's report and noticed Arch was already patched, and quite amazed
about how quickly they did it. Heck, they did it faster than
CentOS/RHEL, which by itself is pretty dang quick.
i'm not so sure it's as bad as heartbleed, though.
Sysop: | Eric Oulashin |
---|---|
Location: | Beaverton, Oregon, USA |
Users: | 106 |
Nodes: | 16 (0 / 16) |
Uptime: | 10:25:35 |
Calls: | 5,846 |
Files: | 8,496 |
D/L today: |
4 files (4,734K bytes) |
Messages: | 343,180 |