GNU Bash through 4.3 processes trailing strings after function - TopicsExpress



          

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. - NIST Scan your network for things like Telnet, FTP, and old versions of Apache (masscan is extremely useful for this). Anything that responds is probably an old device needing a bash patch. And, since most of them cant be patched, you are likely screwed theregister.co.uk/2014/09/25/shell_shocked_not_yet/
Posted on: Sat, 27 Sep 2014 19:57:19 +0000

Trending Topics



Recently Viewed Topics




© 2015