Apple Event: May 7th at 7 am PT

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

CVE-2014-6271 bash vulnerability

more info on this here:

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271

http://www.reddit.com/r/sysadmin/comments/2hc5rk/cve20146271_remote_code_executi on_through_bash/


I'm assuming Apple will release a security update for this on supported versions of the Mac OS but in the meantime, is there a fix that we can apply? What is an easy way to patch this on older OS versions that Apple is no longer supporting? (perhaps something short of recompiling bash)

Posted on Sep 24, 2014 2:44 PM

Reply
43 replies

Sep 25, 2014 2:28 PM in response to Quinnypig

I'm sure there are several trustworthy ways to handle it but I'll leave that to someone else.


It looks like each OS version uses the following versions:


10.5: GNU bash, version 3.2.17(1)-release (i386-apple-darwin9.0)

10.6-10.8: GNU bash, version 3.2.48(1)-release (x86_64-apple-darwin11)

10.9: GNU bash, version 3.2.51(1)-release (x86_64-apple-darwin13)


So compiling once for 10.6-10.8 would be sufficient if one has several systems to patch.


How would one go about patching an older 10.5 system? I realize it's no longer supported by Apple but some software vendors might've stopped updating their software and some may only run on something as new as 10.5.

Sep 25, 2014 4:01 PM in response to etresoft

zdnet states:


He also warned that DHCP services are also vulnerable, as reported in the initial advisory. "Consequently, even though my light scan found only 3,000 results, this thing is clearly wormable, and can easily worm past firewalls and infect lots of systems. One key question is whether Mac OS X and iPhone DHCP service is vulnerable — once the worm gets behind a firewall and runs a hostile DHCP server, that would "game over" for large networks."

One PoC is available at:

https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/


Sep 25, 2014 4:51 PM in response to etresoft

Note that the server is hostile in this example.


The dhcp *client* is what's vulnerable, as it shells out to bash to run configuration scripts.


As per: https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-va riables-code-injection-attack/

DHCP clients invoke shell scripts to configure the system, with values taken from a potentially malicious server. This would allow arbitrary commands to be run, typically as root, on the DHCP client machine.


And of course, OS X is very frequently a DHCP client.

Sep 26, 2014 12:58 AM in response to Quinnypig

DHCP clients invoke shell scripts to configure the system, with values taken from a potentially malicious server. This would allow arbitrary commands to be run, typically as root, on the DHCP client machine.


The question is, though, does the vanilla dhcp client in OS X fork bash (or sh, which is bash on OS X) shells when configuring a network connection?

Sep 27, 2014 3:29 AM in response to alternapop

OK, looks like we have a fix, resolving both vulnerabilities:



Still waiting for Apple to come up with something. At least this allows me to bring my 10.6.8 web servers back online.

Sep 27, 2014 7:39 AM in response to Long Lane

OK. Some details, AFAIK:


  • The OS X dhcp client is an Apple-written package, and is reportedly not vulnerable to rogue dhcp servers. There's a proof-of-concept rogue dhcp server available, so you can verify vulnerable clients locally.
  • bash-based Apache CGI scripts are vulnerable. Very few folks have those bash scripts around. Check your local system.
  • local privilege escalations are possible, so folks with command line login access can get root. On most Macs, it's usually only admins and support folks and occasionally the end-user that are accessing the command line anyway, and those folks already have root.


Current list of "Shellshock" bash-related CVEs:



There are issues for folks with local bash access. But then folks with local access can toss a fork bomb at your computer, or fill your disks, or otherwise cause you problems. As for remote access, you need to have Apache or another web server running or some other way to get at some local bash scripts (captive bash logins or software using scripts and AJAX), and you need to have some bash scripts around to exploit, so... I've checked for scripts, set up some filters, and am going to wait for Apple to issue a patch.


As for the more general mess, it's not OS X. It's likely embedded devices running vulnerable versions of bash. These can include NAS devices, network load balancers, and other such gizmos. OS X client is not likely vulnerable without locally having opened up remote (web, command line, etc) access, and OS X Server vulnerabilities are presently apparently quite limited, but there are reportedly shellshock-based bugs in (for instance) the F5 BIG-IP load balancer web administration.


If you have a decent firewall in front of your network and if haven't opened ports (save via VPN) through that firewall, then nobody can even get at your Macs.

CVE-2014-6271 bash vulnerability

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.