September 25, foreign exposure of a "destruction level" bash vulnerability, hackers can use this vulnerability to remotely execute arbitrary commands, complete control of the target system!
the vulnerability is cve-2014-6271, mainly in bash version 1.14-4.3, and affected systems include: Red Hat Enterprise Linux (versions 4-7), Fedora distribution, CentOS ( Versions 5-7), Ubuntu 10.04 lts,12.04lts and 14.04 LTS, Debian, etc.
experience, the most affected by this bash vulnerability is the website and intranet, as well as some routers, VPN large sites and other network equipment. The vulnerability is not yet affected by the official version of Android, but some third-party ROMs need to be aware of security.
the vulnerability could be exploited by hackers as an automated attack tool to launch large-scale attacks against websites and businesses. The vulnerability is no less threatening than the OpenSSL heart bleed due to the wide range of vulnerabilities and the scope of the impact.
remind the vast number of Web sites and enterprises to update the server security patches to avoid causing significant danger.
"Bash" vulnerability test method
1), Local testingenv x= ' () {:;}; Echo vulnerable ' bash-c "echo this is a test"
2), remote testingfirst write a CGI with bash[email protected]:/usr/lib/cgi-bin# cat bug.sh#!/bin/bashecho "content-type:text/html"echo ""echo ' echo ' echo ' <metahttp-equiv= ' Content-type "content=" Text/html;charset=utf-8 "> "echo ' <title>PoC</title> 'echo ' echo ' <body> 'echo ' <pre> '/usr/bin/envecho ' </pre> 'echo ' </body> 'echo ' Exit 0put it in the/usr/lib/cgi-bin and then use Curl to access
can print out the environment variables. The instructions can be accessed normally. Below bounce a shell
visit to see the results:
"Recommended Patching Scenarios"
http://ftp.gnu.org/pub/gnu/bash/bash-3.0-patches/bash30-017
http://ftp.gnu.org/pub/gnu/bash/bash-3.1-patches/bash31-018
http://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-052
http://ftp.gnu.org/pub/gnu/bash/bash-4.0-patches/bash40-039
http://ftp.gnu.org/pub/gnu/bash/bash-4.1-patches/bash41-012
http://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-048
http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-025
Linux "Bash" exploits explode