Shellshock (software bug)

This is an old revision of this page, as edited by Qwertyus (talk | contribs) at 19:40, 25 September 2014 (inline credits to Red Hat). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

A serious security vulnerability in BASH was publicly disclosed on 24 September 2014. The vulnerability, which has been named ShellShocked by its discoverer, Huzaifa Sidhpurwala of Red Hat.[1] has been added to the United States National Vulnerability Database with identifier CVE-2014-7169.[2]

Attack details

From NIST:

"GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution." [2]

References

  1. ^ Huzaifa Sidhpurwala (2014-09-24). "Bash specially-crafted environment variables code injection attack". Red Hat.
  2. ^ a b "Vulnerability Summary for CVE-2014-7169". National Vulnerability Database. United States Department of Homeland Security. Retrieved 25 September 2014.