Linux Bash find significant security vulnerabilities to modify the method-vulnerability warning-the black bar safety net

2014-09-28T00:00:00
ID MYHACK58:62201454157
Type myhack58
Reporter 佚名
Modified 2014-09-28T00:00:00

Description

GMT 9 August 2 5, message, Linux users today and got a“surprise”it! The Red Hat security team on Linux in the widely used Bash shell, found a subtle but dangerous security vulnerabilities. The vulnerability called the“Bash Bug”or“Shellshock”is.

When the user normal access, the vulnerability allows the attacker's code like in the Shell to perform the same, which for a variety of attacks open the door. And, worse still, the vulnerability has been in Linux there is a very long time, so patching a Linux machine is easy, but to all patch, almost impossible to achieve.

Red Hat and Fedora have already released for the vulnerability patch. The vulnerability also affects OS X, but Apple has not yet released an official patch.

This Bash vulnerability than Heartbleed more dangerous.

— — Robert Graham (@ErrataRob the 2 0 1 4 year 9 month 2 to 4 November

Red Hat's Robert David Graham compared the vulnerability and Heartbleed, found that the former distribution is more extensive, it is possible for the system security of the long-term effects. Graham wrote in a blog post:“there is a lot of software in some way and Shell interaction, we have no way to include the affected by the vulnerability of all software.” According to The Verge reports, Berkeley ICSI researcher Nicholas Weaver also agreed with this statement:“it is very vague, very scary, and will be with us for many years.”

Network security company Rapid7 Engineering Manager Tod Beardsley warned that the Bash vulnerability with a severity level of“1 0”, which means that it on the user's computer at risk. Bash exploits the complexity of the level is“low”, means that hackers can relatively easily use it to launch attacks.

In addition, the network security company Trail of Bits CEO Dan Guido said,“Heartbleed”vulnerability can allow hackers to monitor a user's computer, but will not take(www.111cn.net)to obtain control. And the use of the Bash vulnerability of the method is also more simple-just need to cut and paste a line of code.

Allegedly, Google security researcher Tavis Ormandy said on Twitter, the Linux system provider to launch the patches seemed“incomplete”, which raises several security experts worried. (Responsible for encoding/single Pearl)

This article reprinted from the Linux Chinese, the original from The Verge, the portion of the content with excision.

Currently, 3 6 0 Security Center shall issue a“Bash”vulnerability testing method, at the same time remind the majority of websites and businesses timely Update Services server security patches, avoid to cause significant danger.

The “Bash”vulnerability testing methods

1, the local test

env x='() { :;}; echo vulnerable' bash-c "echo this is a test"

2, The remote test

First with BASH to write a CGI

root@kali:/usr/lib/cgi-bin# cat bug.sh

!/ bin/bash

echo "Content-type: text/html"

echo ""

echo '<html>'

echo '<head>'

echo '<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">'

echo '<title>PoC</title>'

echo '</head>'

echo '<body>'

echo '<pre>'

/usr/bin/env

echo '</pre>'

echo '</body>'

echo '</html>'

exit 0

Put to/usr/lib/cgi-bin, and then use curl to access

[1] [2] next