GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Major security alert - Linux etc... (https://gfy.com/showthread.php?t=1150695)

EddyTheDog 09-25-2014 04:52 AM

Major security alert - Linux etc...
 
http://www.bbc.co.uk/news/technology-29361794

Looks serious.....

seeandsee 09-25-2014 06:12 AM

Fucking Linux :)

WDF 09-25-2014 08:54 AM

A bash patch was applied to our cpanel servers yesterday during an update.

Babaganoosh 09-25-2014 09:15 AM

https://gfy.com/showthread.php?t=1150685

Heads up though, it doesn't look like the patch fixed it completely yet.

http://www.reddit.com/r/netsec/comme...l_exploitable/

Harmon 09-25-2014 09:17 AM

https://gfy.com/image.php?u=125466&dateline=1388268860

_Richard_ 09-25-2014 09:17 AM

ah that sucks

Babaganoosh 09-25-2014 09:43 AM

https://access.redhat.com/node/1200223

If you're affected, mod_security is the best way to stop this right now.

If you're not using mod_security, iptables can protect you a little better than doing nothing.

iptables -I INPUT -m string --hex-string '|28 29 20 7B|' --algo bm -j DROP

MrGusMuller 09-25-2014 02:32 PM

To test if your version of Bash is vulnerable to this issue, run the following command:

$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
If the output of the above command looks as follows:

vulnerable this is a test
you are using a vulnerable version of Bash. The patch used to fix this issue ensures that no code is allowed after the end of a Bash function. Thus, if you run the above example with the patched version of Bash, you should get an output similar to:

$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test" bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x' this is a test

nm_ 09-25-2014 05:05 PM

already found people pinging to check for the exploit in my server logs ;[

update your servers asap!

Klen 09-26-2014 05:12 AM

Quote:

Originally Posted by MrGusMuller (Post 20235094)
To test if your version of Bash is vulnerable to this issue, run the following command:

$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
If the output of the above command looks as follows:

vulnerable this is a test
you are using a vulnerable version of Bash. The patch used to fix this issue ensures that no code is allowed after the end of a Bash function. Thus, if you run the above example with the patched version of Bash, you should get an output similar to:

$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test" bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x' this is a test

Got second thing so i guess i am patched.But this look same shit as mysql inject on sql select query.

just a punk 09-26-2014 05:32 AM

Code:

yum clean all && yum update bash


All times are GMT -7. The time now is 08:38 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123