-
All replies
-
Helpful answers
-
Sep 25, 2014 1:48 PM in response to etresoftby Quinnypig,This is unfortunately inaccurate.
For exampe, there are exploits in the wild that leverage DHCP. Suddenly the coffee shop wifi just got a lot more dangerous...
-
Sep 25, 2014 2:10 PM in response to alternapopby alternapop,It would be nice if someone would do all of the recompiling, even for older OS versions (10.5, 10.6), and make the final "bash" files publicly available for download once the bug(s) has been fixed.
-
Sep 25, 2014 2:11 PM in response to alternapopby Quinnypig,Yes-- but who aside from Apple is trusted enough to do that?
"Hi, you don't know me, but use this file instead. It's probably fine."
-
Sep 25, 2014 2:28 PM in response to Quinnypigby alternapop,I'm sure there are several trustworthy ways to handle it but I'll leave that to someone else.
It looks like each OS version uses the following versions:
10.5: GNU bash, version 3.2.17(1)-release (i386-apple-darwin9.0)
10.6-10.8: GNU bash, version 3.2.48(1)-release (x86_64-apple-darwin11)
10.9: GNU bash, version 3.2.51(1)-release (x86_64-apple-darwin13)
So compiling once for 10.6-10.8 would be sufficient if one has several systems to patch.
How would one go about patching an older 10.5 system? I realize it's no longer supported by Apple but some software vendors might've stopped updating their software and some may only run on something as new as 10.5.
-
Sep 25, 2014 3:54 PM in response to Quinnypigby etresoft,Quinnypig wrote:
there are exploits in the wild that leverage DHCP.
Such as?
-
Sep 25, 2014 4:01 PM in response to etresoftby Quinnypig,zdnet states:
He also warned that DHCP services are also vulnerable, as reported in the initial advisory. "Consequently, even though my light scan found only 3,000 results, this thing is clearly wormable, and can easily worm past firewalls and infect lots of systems. One key question is whether Mac OS X and iPhone DHCP service is vulnerable — once the worm gets behind a firewall and runs a hostile DHCP server, that would "game over" for large networks."
One PoC is available at:
https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/
-
Sep 25, 2014 4:42 PM in response to Quinnypigby etresoft,The key word in that quote is "server". If you aren't running a server, there is no issue.
-
Sep 25, 2014 4:51 PM in response to etresoftby Quinnypig,Note that the server is hostile in this example.
The dhcp *client* is what's vulnerable, as it shells out to bash to run configuration scripts.
- DHCP clients invoke shell scripts to configure the system, with values taken from a potentially malicious server. This would allow arbitrary commands to be run, typically as root, on the DHCP client machine.
And of course, OS X is very frequently a DHCP client.
-
Sep 25, 2014 6:46 PM in response to Quinnypigby etresoft,Well isn't that a nifty trick. Although that is a pretty unlikely scenario, it is entirely out of the control of the user. I stand corrected. Thanks!
-
Sep 26, 2014 12:58 AM in response to Quinnypigby Espen Vestre,- DHCP clients invoke shell scripts to configure the system, with values taken from a potentially malicious server. This would allow arbitrary commands to be run, typically as root, on the DHCP client machine.
The question is, though, does the vanilla dhcp client in OS X fork bash (or sh, which is bash on OS X) shells when configuring a network connection?
-
Sep 26, 2014 2:00 AM in response to Espen Vestreby complexitydaemon,No. Only in 10.0.x can the dhcp client start a shell, and 10.0.x shipped with tcsh instead of bash. So OS X and iOS are thankfully not vulnerable unless I've made a mistake in parsing the source code—more on my blog here.
-
Sep 26, 2014 2:09 AM in response to complexitydaemonby Espen Vestre,Thanks, I'll have a look at your blog. This was really worrying me but I don't have much time for digging into the code today, so you saved me some time
-
Sep 26, 2014 4:36 AM in response to alternapopby purwin,There is also an updated CVE-2014-7169
Seem that the original patches from OS vendors did not cover all points.
Has anyone seen the an update from Apple on this?
-
Sep 26, 2014 5:19 PM in response to purwinby etresoft,purwin wrote:
Has anyone seen the an update from Apple on this?
Here is Apple's unofficial statement to its unofficial company blogger: http://www.loopinsight.com/2014/09/26/apples-statement-on-the-unix-bash-vulnerab ility/
-
Sep 27, 2014 3:29 AM in response to alternapopby Long Lane,OK, looks like we have a fix, resolving both vulnerabilities:
- http://apple.stackexchange.com/questions/146849/how-do-i-recompile-bash-to-avoid -shellshock-the-remote-exploit-cve-2014-6271-an/146851#146851
- or here in clean form: http://alblue.bandlem.com/2014/09/bash-remote-vulnerability.html
Still waiting for Apple to come up with something. At least this allows me to bring my 10.6.8 web servers back online.