[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Testing for Shellshock ... combinatorics and latest(Shellshock) Bash

From: Chet Ramey
Subject: Re: Testing for Shellshock ... combinatorics and latest(Shellshock) Bash Vulnerability...(attn: Chet Ramey)
Date: Thu, 09 Oct 2014 21:51:08 -0400
User-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.6.0

On 10/9/14, 3:46 PM, Rick Karcich (rkarcich) wrote:
> Hello Chet,
> Re: testing for Shellshock...  would like your feedback... specifically, 
> regarding the possibility of human-directed combinatorial testing to find 
> this Bash vulnerability...
> Given the knowledge about Shellshock that's been developed, I'm wanting to 
> define more of the attack surface for Shellshock - and put this into an input 
> model for combinatorial testing...

It's not clear that this problem would have been appropriate for automated
testing.  It was code that did what was intended: the problem is that it
was invoked in (remotely-triggered) contexts that were unintended.

The triggering condition was the appropriately-formatted environment
variable.  The issue that made it dangerous was that there were
circumstances under which remote users could specify values that were
turned into environment variables by applications that ended up invoking
bash.  In a local environment, it was a non-issue: a clever way to execute
commands bash would have let you execute in a more straightforward way.

If your attack surface is the shell parser, then you can just run

bash -nc 'randomly-generated-string'

all day long and see what happens.


``The lyf so short, the craft so long to lerne.'' - Chaucer
                 ``Ars longa, vita brevis'' - Hippocrates
Chet Ramey, ITS, CWRU    address@hidden    http://cnswww.cns.cwru.edu/~chet/

reply via email to

[Prev in Thread] Current Thread [Next in Thread]