The Following 3 Users Say Thank You to Bundyo For This Useful Post: | ||
|
2014-09-25
, 07:40
|
|
Posts: 6,436 |
Thanked: 12,701 times |
Joined on Nov 2011
@ Ängelholm, Sweden
|
#2
|
|
2014-09-25
, 08:18
|
|
Posts: 2,355 |
Thanked: 5,249 times |
Joined on Jan 2009
@ Barcelona
|
#3
|
The Following 4 Users Say Thank You to javispedro For This Useful Post: | ||
|
2014-09-25
, 08:23
|
Posts: 252 |
Thanked: 597 times |
Joined on Oct 2011
@ Denmark
|
#4
|
|
2014-09-25
, 08:28
|
|
Posts: 6,436 |
Thanked: 12,701 times |
Joined on Nov 2011
@ Ängelholm, Sweden
|
#5
|
|
2014-09-25
, 08:39
|
|
Posts: 2,355 |
Thanked: 5,249 times |
Joined on Jan 2009
@ Barcelona
|
#6
|
Do they still use Bash3 and why? Are they scared of GPLv3 software like Apple are?
@javispedro there are should be some internals accepting environment variables.
|
2014-09-25
, 09:17
|
Guest |
Posts: n/a |
Thanked: 0 times |
Joined on
|
#7
|
|
2014-09-25
, 09:29
|
|
Posts: 2,355 |
Thanked: 5,249 times |
Joined on Jan 2009
@ Barcelona
|
#8
|
So, applications that expose some of the functionality that is vulnerable (abitrary environment variables) could be used to get at least shell code execution as current user.
|
2014-09-25
, 10:25
|
|
Posts: 2,355 |
Thanked: 5,249 times |
Joined on Jan 2009
@ Barcelona
|
#10
|
http://prng.net/shellshock/
I also filed a bug report @together, please vote:
https://together.jolla.com/question/...hellshock-bug/
Technically, there are three determinate states the cat could be in: Alive, Dead, and Bloody Furious.