On Fri, 26 Sep 2014, Andrew McN <[email protected]> wrote:
> Secondly, don't assume that debian's default symlink fo /bin/sh to 
> /bin/dash means you are not vulnerable to holes in bash.  There's a lot 
> of scripts and system calls around which explicitly invoke `bash` rather 
> than `sh`.  Also if a user uses /bin/bash as their shell, then this bug 
> gives a way to circumvent command restrictions on a given ssh key, as 
> configured in ~/.ssh/authorised_keys.

#!/bin/bash
echo ok

I created a script named zz with the above contents.  I ran the following test 
using bash 4.2+dfsg-0.1 from Debian/Wheezy (the unfixed version) and got an 
unexpected SEGV.

# ORIG="() { :;} ; touch /tmp/ohno" ./zz
/bin/bash: touch: No such file or directory
Segmentation fault

I also got a SEGV from remote when the shell for root was /bin/sh (dash).


I verified that either bash as the root shell or as the shell for a script was 
sufficient for an exploit.

-- 
My Main Blog         http://etbe.coker.com.au/
My Documents Blog    http://doc.coker.com.au/
_______________________________________________
luv-main mailing list
[email protected]
http://lists.luv.asn.au/listinfo/luv-main

Reply via email to