![]() |
2014-09-25
, 19:33
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#22
|
![]() |
2014-09-25
, 19:51
|
|
Posts: 4,708 |
Thanked: 4,649 times |
Joined on Oct 2007
@ Bulgaria
|
#23
|
![]() |
2014-09-25
, 20:05
|
|
Posts: 2,355 |
Thanked: 5,249 times |
Joined on Jan 2009
@ Barcelona
|
#24
|
The Following 2 Users Say Thank You to javispedro For This Useful Post: | ||
![]() |
2014-09-25
, 21:03
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#25
|
![]() |
2014-09-25
, 21:59
|
Posts: 136 |
Thanked: 68 times |
Joined on Nov 2013
@ Streets of Avalon | Zwolle, the Netherlands
|
#26
|
Since no Maemo originally shipped bash, you can be certainly sure no script is using it (unless you replaced /bin/sh with bash but I know for sure that didn't work on Fremantle). So it's also not exploitable.
![]() |
2014-09-26
, 07:20
|
Posts: 20 |
Thanked: 13 times |
Joined on Jan 2010
@ Finland
|
#27
|
![]() |
2014-09-26
, 08:17
|
Posts: 334 |
Thanked: 616 times |
Joined on Sep 2010
|
#28
|
|
2014-09-26
, 08:25
|
Guest |
Posts: n/a |
Thanked: 0 times |
Joined on
|
#29
|
If someone is curious how shellshock could be used to attack a Sailfish device, this illustrates one attack vector: https://pbs.twimg.com/media/ByZZUzmIIAAuFaR.jpg:large
That is, a malicious DHCP server could attack by sending code in the options field. I haven't verified this with my Jolla, but in theory this could be bad. Think of public WIFI access points...
The Following User Says Thank You to For This Useful Post: | ||
![]() |
2014-09-26
, 09:26
|
|
Posts: 2,355 |
Thanked: 5,249 times |
Joined on Jan 2009
@ Barcelona
|
#30
|
If someone is curious how shellshock could be used to attack a Sailfish device, this illustrates one attack vector: https://pbs.twimg.com/media/ByZZUzmIIAAuFaR.jpg:large
That is, a malicious DHCP server could attack by sending code in the options field. I haven't verified this with my Jolla, but in theory this could be bad. Think of public WIFI access points...
Probably more worrying for n900 is the apt-get vulnerability (do you apt-get upgrade vulnerable apt-get to get safe apt-get???), didn't see a thread about it:
https://lists.debian.org/debian-secu.../msg00212.html
https://lists.debian.org/debian-secu.../msg00216.html
https://lists.debian.org/debian-secu.../msg00219.html
Last edited by szopin; 2014-09-25 at 20:10.