All posts by 007admin
Apple: OS X Safe By Default Against Bash Vulnerability
Apple said it is working on a patch for OS X to counter the Bash vulnerability, but in the meantime is telling users the OS is safe by default.
Hackers Are Already Using the Shellshock Bug to Launch Botnet Attacks – WIRED
Companies ‘Patching Like Crazy’ to Stem Shellshock Flaw – The Wall Street Journal
Hackers Launch Attacks Exploiting 'Shellshock' Bug in Bash Software – Reuters
Small Businesses Lack the Security Knowledge to Protect their Mobiles – BetaNews
Spotlight: Threat Visualizations – Software Advice
Apache mod_cgi Bash Environment Variable Code Injection
This Metasploit module exploits a code injection in specially crafted environment variables in Bash, specifically targeting Apache mod_cgi scripts through the HTTP_USER_AGENT variable.
Cisco Security Advisory 20140926-bash
Cisco Security Advisory – On September 24, 2014, a vulnerability in the Bash shell was publicly announced. The vulnerability is related to the way in which shell functions are passed though environment variables. The vulnerability may allow an attacker to inject commands into a Bash shell, depending on how the shell is invoked. The Bash shell may be invoked by a number of processes including, but not limited to, telnet, SSH, DHCP, and scripts hosted on web servers. All versions of GNU Bash starting with version 1.14 are affected by this vulnerability and the specific impact is determined by the characteristics of the process using the Bash shell. In the worst case, an unauthenticated remote attacker would be able to execute commands on an affected server. However, in most cases involving Cisco products, exploitation of the vulnerability results in an authenticated attacker having the ability to execute commands for which they are not authorized. A number of Cisco products ship with or leverage an affected version of the Bash shell. This advisory will be updated as additional information becomes available. Cisco may release free software updates that address this vulnerability if a product is determined to be affected by this vulnerability.
DHCP Client Bash Environment Variable Code Injection
This Metasploit module exploits a code injection in specially crafted environment variables in Bash, specifically targeting dhclient network configuration scripts through the HOSTNAME, DOMAINNAME, and URL DHCP options.