On 02/10/14 15:28, Roy Marples wrote:
> On 2014-09-29 20:17, Simon Kelley wrote:
>> On 27/09/14 11:01, Roy Marples wrote:
>>> On Friday 26 Sep 2014 21:14:20 Simon Kelley wrote:
>>>> This is just a heads-up that if you're using the --dhcp-script
>>>> option in
>>>> dnsmasq, and the script you're calling is being interpreted by bash,
>>>> then you're affected by the shellshock bug.
>>>>
>>>> The bug allows execution of arbitrary code contained in the values of
>>>> environment variables, and there are several variables in the
>>>> environment inherited by the DHCP script whose values can be set
>>>> directly by a DHCP client, so any DHCP client on your network (or
>>>> elsewhere, if your firewall allows) can execute arbitrary shellcode,
>>>> probably as root, with a simple DHCP request.
>>>>
>>>> The fix, of course, is to update bash.
>>>
>>> What's your reason for not sanitising the variables?
>>>
>>> I just released dhcpcd-6.4.7 which fixes this exact issue. I changed
>>> from
>>> using my custom sanitiser to svis(3) with VIS_CSTYLE | VIS_OCTAL and the
>>> output can be decoded using unvis(1).
>>> Oddly enough this encoding matches the style dhcpcd was using
>>> previously which
>>> is a nice win for me.
> 
> In the cold light day after shellshock I've come to the conclusion that
> you're right am I'm wrong.
> Admittedly I was swayed by a SUSE security report which dealt with badly
> quoted shell scripts which addressed the issue by introducing some
> sanistisation into dhcpcd and I went from there.
> 
> Now, dhcpcd just sanistises according to the option encoding. So as most
> string options specify ASCII NVT dhcpcd will ensure that's what you get,
> stopping at the first invalid or non printable character. There are
> other encoding types such as domain, ascii, raw and binhex which will
> satisfy everything hopefully.
> No more shell sanitising!
> 

I think that's probably the right approach. If I could revisit this, I
probably would, but changing how (eg) the client-id is passed to the
DHCP script, would break existing scripts.

Cheers,

Simon.



_______________________________________________
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
http://lists.thekelleys.org.uk/mailman/listinfo/dnsmasq-discuss

Reply via email to