RF Generation.  The Classic and Modern Gaming Databases.RF Generation.  The Classic and Modern Gaming Databases.

New on the Blogs
Hot Community Blog Entries
Nielsen's Favorites on Channel 4
RF Generation Message Board Welcome, Guest. Please login or register.
Did you miss your activation email?
April 27, 2024, 10:09:22 PM
Home Help Search Calendar Member Map Arcade Login Register
News: RF Generation: Where the PSP Go matters more than HBO Go.

RF Generation Message Board | Other | Idle Chatter | Linux/Unix 'Bash Shell' security hole found (Patch NOW!) 0 Members and 1 Guest are viewing this topic. « previous next »
Pages: [1] Print
Author Topic: Linux/Unix 'Bash Shell' security hole found (Patch NOW!)  (Read 1506 times)
NxCmp
N-Gage
*
Posts: 45


WWW Stats
« on: September 25, 2014, 07:28:35 AM »

SECURITY THREAT

If you are running or have "bash" installed on any of your systems/devices that use versions between 1.14 to 3.4 you are vulnerable. This is a very large threat. It allows the attack to execute code and commands on the target system. To check your version in the command line run "bash --version" to check, if you fall into that version range please update your package manage and update/patch immediately.

To test if you are at risk run:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If the console prints:

vulnerable
this is a test

You are not protected, once patched you should see:

bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test

Best of luck everyone!

Link: https://isc.sans.edu/foru...mins+time+to+patch+/18703
Link: http://www.zdnet.com/unix...ux-bash-...ed-7000034021/

Thank you.
____________
Logged

Need computer or other I.T. related help ? Send me a PM, would be glad to help.
Shadow Kisuragi
Variant Collector
Director
*****
United States
Posts: 10853
Awards: 2013 Fantasy Football Winner



 Stats
« Reply #1 on: September 25, 2014, 07:34:36 AM »

Thanks for the heads up!
Logged

mumboking
Do you feel the heartbeat of the land?
PlayStation
****
United Kingdom
Posts: 2683


WWW Stats
« Reply #2 on: September 25, 2014, 08:35:59 AM »

I updated the bash package on my Ubuntu earlier today.
I'm safe. Tongue
Logged
NxCmp
N-Gage
*
Posts: 45


WWW Stats
« Reply #3 on: September 26, 2014, 08:07:38 AM »

SECURITY THREAT  UPDATE

A second way to exploit this problem has been found and there is NO FIX yet at the time of this post.

To test to see if the second method still effects you, you can run:

env -i X='() { (a)=>\' bash -c 'echo date'; cat echo

You will still receive and error but it will create a file in the current director you are in called "echo". If you find the Date/Time printed in this file you are still vulnerable to the second method of attach.

Now keep in mind that since this type of threat is really only meant for servers that offer services Online, patching the second method is not 100% vital. While you should still patch the first method for any system and the fact a fix is being created for the second, you should still treat this threat with care and should still fully patch all your systems with batch regardless.

Some of the known attack vectors are:

- cgi-bin
- ssh
- DHCP

Thanks
« Last Edit: September 26, 2014, 08:09:46 AM by NxCmp » Logged

Need computer or other I.T. related help ? Send me a PM, would be glad to help.
NxCmp
N-Gage
*
Posts: 45


WWW Stats
« Reply #4 on: September 26, 2014, 09:56:57 AM »

SECURITY THREAT UPDATE 2

A patch was released for the second exploit method. Please run your package managers and update bash again.

Thanks
Logged

Need computer or other I.T. related help ? Send me a PM, would be glad to help.
Pages: [1] Print 
« previous next »
Jump to:  


Login with username, password and session length

Powered by MySQL Powered by PHP Powered by SMF 1.1.21 | SMF © 2015, Simple Machines
Simple Audio Video Embedder

RF Generation Theme derived from YabbGrey By Nesianstyles | Buttons by A.M.A
Valid XHTML 1.0! Valid CSS!
Page created in 0.141 seconds with 24 queries.
Site content Copyright © rfgeneration.com unless otherwise noted. Oh, and keep it on channel three.