Linux "Bash" exploits explode

Source: Internet
Author: User
Tags explode

September 25, foreign exposure of a "destruction level" bash vulnerability, hackers can use this vulnerability to remotely execute arbitrary commands, complete control of the target system!

the vulnerability is cve-2014-6271, mainly in bash version 1.14-4.3, and affected systems include: Red Hat Enterprise Linux (versions 4-7), Fedora distribution, CentOS ( Versions 5-7), Ubuntu 10.04 lts,12.04lts and 14.04 LTS, Debian, etc.

experience, the most affected by this bash vulnerability is the website and intranet, as well as some routers, VPN large sites and other network equipment. The vulnerability is not yet affected by the official version of Android, but some third-party ROMs need to be aware of security.

the vulnerability could be exploited by hackers as an automated attack tool to launch large-scale attacks against websites and businesses. The vulnerability is no less threatening than the OpenSSL heart bleed due to the wide range of vulnerabilities and the scope of the impact.

remind the vast number of Web sites and enterprises to update the server security patches to avoid causing significant danger.

"Bash" vulnerability test method

1), Local testingenv x= ' () {:;}; Echo vulnerable ' bash-c "echo this is a test"

                              2), remote testingfirst write a CGI with bash[email protected]:/usr/lib/cgi-bin# cat bug.sh#!/bin/bashecho "content-type:text/html"echo ""echo ' echo ' echo ' <metahttp-equiv= ' Content-type "content=" Text/html;charset=utf-8 "> "echo ' <title>PoC</title> 'echo ' echo ' <body> 'echo ' <pre> '/usr/bin/envecho ' </pre> 'echo ' </body> 'echo ' Exit 0put it in the/usr/lib/cgi-bin and then use Curl to access

can print out the environment variables. The instructions can be accessed normally. Below bounce a shell

visit to see the results:

"Recommended Patching Scenarios"
http://ftp.gnu.org/pub/gnu/bash/bash-3.0-patches/bash30-017
http://ftp.gnu.org/pub/gnu/bash/bash-3.1-patches/bash31-018
http://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-052
http://ftp.gnu.org/pub/gnu/bash/bash-4.0-patches/bash40-039
http://ftp.gnu.org/pub/gnu/bash/bash-4.1-patches/bash41-012
http://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-048
http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-025

Linux "Bash" exploits explode

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.