Download presentation
Presentation is loading. Please wait.
Published byTheodora Hodges Modified over 9 years ago
1
Bash shell Code Injection 윤신필립 하승범
2
1.What is ShellShock. 2.Background Knowledge. 3.Shellshock CVE-2014-6271 4.Additional vulnerabilities 5.Dangerousness of this Vulnerability. 6.Way of Solutions.
3
What is Shellshock ? CVE 2014-6271 Disclosed by Akamai Technology of Stephane Chazelas on 24 September 2014. CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278
4
How to set environment variable?
9
Bash Architecture Run bash initialization Bash environment variable Print Bash shell prompt Wait instruction Save inst to string and parsing Run instruction
10
How to set environment variable?
11
Principle of CVE-2014-6271 Use parse_and_execute() function int parse_and_execute (string, from_file, flags) {... while (*(bash_input.location.string)) {...
12
PATCH VERSION /* Don't import function names that are invalid identifiers from the environment, though we still allow them to be defined as shell variables. */ if (legal_identifier (name)) parse_and_execute(temp_string, name, SEVAL_NONINT|SEVAL_NOHIST|SEVAL_FINCDEF|SEVAL_ONECMD); Principle of CVE-2014-6271 limit number of process check function
13
CVE-2014-6271 DEMO
14
Additional vulnerabilities
15
CVE-2014-7169
16
CVE-2014-7186
17
CVE-2014-6278
18
Dangerousness of this Vulnerability
19
Attacker CGI PAGE Web Server virus Server invade & Destroy DB Server Bash 실행 HTTP PACKET Malicious commands Save in Environment variable
20
Way of Solutions UPDATE sudo apt-get upgrade sudo apt-get update Fedora, Redhat sudo yum update
21
Way of Solutions OS X bash Update 1.0 Mavericks http://support.apple.com/kn/DL1769http://support.apple.com/kn/DL1769 Mountain Lion http://support.apple.com/kn/DL1768http://support.apple.com/kn/DL1768 Lion http://support.apple.com/kn/DL1767http://support.apple.com/kn/DL1767
22
Way of Solutions Troy Hunt (Tremendous in-depth primer on Shellshock) In short, the advice to consumers is this: watch for security updates, particularly on OS X. Also keep an eye on any advice you may get from your ISP or other providers of devices you have that run embedded software. Do be cautious of emails requesting information or instructing you to run software
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.