Well Volker I am pretty sure I understand the basic nature of the CVEs.. both rounds.
I also do understand that real threats will not be disclosed easily.
What I do expect is that for main distributions to state the basics about a default server installation vulnerability throw telnet\ssh\non_root_user_shell etc.
(OpenBSD should basically also be vulnerable to this CVEs but I assume that default installation mitigates the issue by other means)
Since the vulnerability is out there for years...(what year bash 1.X was released??)
I am pretty sure that efforts to fix it are there for some time and now it is maybe the time which the fix is already ready.
It might be true or not but it is sure right to fix something now.
Also if until now many systems was not compromised by this CVEs it is possible that default system installations are not affected by it.
I am not talking about admins that do not make sure that their scripts are not compromised or running "curl some_address|bash" since these are already vulnerable by intention or misunderstanding.
But for example if sshd by default is compromising the system by allowing injection of variables with root access to the system it might be nothing that bash should handle by default.
sshd for example should not allow the existence of "function injection" which is a much higher priority then actually patching bash.
If an admin wrote a cgi script that allows injection of functions into the bash environment then the cgi script should be fixed...
If the issue is the mod_cgi interface itself allowing all sort of stuff it is not 100% bash fault.
This issue is almost the same as php or other scripts that quotes a variable straight into a sql query and not using the "values" and "?"(question marks) to restrict the variables into a specific scope.
>From my point of view the php script should be fixed to prevent the sql injection rather then patching MySQL or any others.
All The Bests,
Eliezer
On 09/28/2014 12:22 AM, Volker Kuhlmann wrote:
Tough, your problem. Ditto with firmware for stuff from vendors which
don't know you any more.
Please keep on searching the Internet for more cases and explanations[1]
for why it was a good idea to patch yesterday. Or trust people like
Scott. What does a CVE rating of 10/10 mean?
Btw CVE-2014-6271 was just round one. See CVE-2014-7169 for round two!
HTH,
Volker
[1] There was some elaboration here:
http://lists.canterbury.ac.nz/pipermail/linux-users/
_______________________________________________
NZNOG mailing list
NZNOG@list.waikato.ac.nz
http://list.waikato.ac.nz/mailman/listinfo/nznog