05Oct2014 (UTC +8) Since QNAP is a common NAS that I see it posted in TipidPC quite often, heads-up on a a simple PoC sploit against QNAP just using curl has been posted:
http://seclists.org/oss-sec/2014/q3/806 Here's a good tech analysis on how attacks have been happening: http://www.fireeye.com/blog/technical/2014/10/the-shellshock-aftershock-for-nas-administrators.html --Drexx On Mon, Sep 29, 2014 at 4:50 PM, Ian Dexter R. Marquez wrote: > It's not over yet: > > http://lcamtuf.blogspot.co.uk/2014/09/bash-bug-apply-unofficial-patch-now.html > > TL;DR Studying the original "Shellshock" exploit brought forth > numerous other problems with the Bash function parser. CVEs are > cropping up like flies. Hope vendors catch up. > > Interesting article about exploits in the wild: > > http://www.fireeye.com/blog/uncategorized/2014/09/shellshock-in-the-wild.html > > On Fri, Sep 26, 2014 at 12:44 PM, Drexx Laggui [personal] wrote: >> 26Sep2014 (UTC +8) >> >> I presume most of you have heard the news about Shellshock already. >> Here are more actionable information about the issue. >> >> Some are saying it's as big as a problem as Heartbleed, but my gut >> feeling disagrees. I maybe wrong though. >> >> ******************** >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA1 >> >> >> SANS FLASH REPORT: The Shellshock vulnerability: What you should do now. >> >> September 25, 2014 >> >> Shellshock merits this FLASH report because it is so widespread and so >> easy to exploit on systems like your firewalls and web servers and >> other similarly important servers running LINUX. >> >> >> Johannes Ullrich, Director of SANS Internet Storm Center just updated >> a brief webcast to provide authoritative answers to the five questions >> we are being asked: >> >> 1. How important is Shellshock (which specific types of systems can >> actually be exploited now)? >> >> 2. What is the primary way that this vulnerability is being exploited? >> >> 3. What went wrong? Where did the vulnerability come from? >> >> 4. How can you find out which of your systems are vulnerable? and How >> easy it is for attackers to find the vulnerable systems on your >> network? >> >> 5. How can you protect yourself? >> >> You can see the slides and listen to his briefing at: >> https://isc.sans.edu/forums/diary/Webcast+Briefing+Bash+Code+Injection+Vulnerability/18709 >> >> Storm Center has also posted a FAQ which is being updated as new data is >> found: >> https://isc.sans.edu/forums/diary/Update+on+CVE-2014-6271+Vulnerability+in+bash+shellshock+/18707 >> >> Alan Paller, Director of Research, SANS institute >> [...] >> ******************** Drexx Laggui -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA http://www.laggui.com ( Manila & California ) Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer PGP fingerprint = 0117 15C5 F3B1 6564 59EA 6013 1308 9A66 41A2 3F9B _________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List http://lists.linux.org.ph/mailman/listinfo/plug Searchable Archives: http://archives.free.net.ph

