[Info-vax] And now bash has a vulnerability

John E. Malmberg wb8tyw at qsl.network
Thu Sep 25 19:13:14 EDT 2014


On 9/25/2014 7:43 AM, RobertsonEricW wrote:
> On Thursday, September 25, 2014 8:08:13 AM UTC-4, hb wrote:
>> On 09/25/2014 01:32 PM, RobertsonEricW wrote:
>>> Thanks for posting this information! OpenVMS bash is currently built using
>> Bash 4.3.24. I am assuming that this contains the incomplete fix. But I will
>> keep an eye out for any information on the Bash development site.

1. Yes GNV Bash 4.3.24 is vulnerable, so do not hack your web server to 
use it to run CGI scripts.

2. There is a GNU Bash 4.3.25 patch, but it does not completely fix the 
issue.  I have not tried building bash with it on VMS, and do not plan to.

3. The complete fix is expected to be in the Bash 4.3.26 patch.  When 
that becomes available, depending my schedule, I will look at generating 
new kits, mainly so that people do not have to be concerned.

4. Currently none of the known network facing products on VMS are aware 
of the GNV Bash shell or call it, and most probably can not be 
configured to call it in a way that will allow an exploit on VMS.

When GNV Bash is invoked from DCL, it ignores the logical names and DCL 
symbols that other C programs would treat as environment variables.

This includes launching GNV bash from LIB$SPAWN() as Perl normally does.

It is also likely that you can not do this exploit on VMS from a C 
program using "system()" or "popen()", but I have not done any tests to 
confirm or bust that theory, but these both appear to just call 
LIB$SPAWN() with out passing the environment array.

This exploit can not be triggered from a C program that does "execlp()", 
"execl()", "execvp()", or "execv()" as they do not pass the environment 
array to the child.

This leaves programs that call "execle()" or "execve()" as being able to 
launch bash in a way to exploit the vulnerability on VMS.

Regards,
-John
wb8tyw at qsl.network
Personal Opinion Only




More information about the Info-vax mailing list