[dns-operations] ShellShock exploit through the DNS
Simon Munton
Simon.Munton at cdns.net
Tue Oct 14 08:01:02 UTC 2014
(Sorry, this is not strictly DNS, but I would guess that this is the
cause of this shell-shock vector).
When looking at the code for libc I was most disappointed to see that
"/bin/sh" is hard coded for both "popen()" and "system()"
Where as I had previously assumed that the environment variable SHELL
could override this.
As "/bin/sh" is almost always a symlink to "/bin/bash", and many O/S
scripts assume this to be the case (i.e. use bash specific features,
without declaring "#!/bin/bash"), so simply making "/bin/sh" a link to
(say) "/bin/ash" is probably not an option.
So heads-up to any systems that use "popen()" or "system()" but have not
had bash upgraded - they may also have vulnerabilities.
IMHO, these two vectors mean shellshock will provide all sorts of
unexpected opportunities, until everybody is upgraded.
On 14/10/14 08:00, Stephane Bortzmeyer wrote:
> Funny: an OS sends the result of some DNS queries to bash, allowing
> the DNS operator to attack DNS clients with ShellShock:
>
> http://packetstormsecurity.com/files/128650
>
> What about an evil AS 112 operator attacking 168.192.in-addr.arpa
> users?
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-jobs mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
>
More information about the dns-operations
mailing list