Shellshock (software bug)

This is an old revision of this page, as edited by Qwertyus (talk | contribs) at 19:54, 25 September 2014 (name not given by RH; intro for the general public). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Shellshock is the name of a serious security vulnerability in BASH, a command interpreter used by many web servers running Apache and/or SSH. The vulnerability, was publicly disclosed on 24 September 2014 by Huzaifa Sidhpurwala of Red Hat.[1] It has been added to the United States National Vulnerability Database with identifier CVE-2014-7169.[2]

Attack details

From NIST:

"GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution." [2]

References

  1. ^ Huzaifa Sidhpurwala (2014-09-24). "Bash specially-crafted environment variables code injection attack". Red Hat.
  2. ^ a b "Vulnerability Summary for CVE-2014-7169". National Vulnerability Database. United States Department of Homeland Security. Retrieved 25 September 2014.