env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
ubuntu@arm:~$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test" vulnerable < bad this is a test
apt-get update && apt-get upgradeAfter and update, the system was still vulnerable. After upgrade it was OK.This is probably only an issue if you are running a server like Apache on your bone.--
For more options, visit http://beagleboard.org/discuss
---
You received this message because you are subscribed to the Google Groups "BeagleBoard" group.
To unsubscribe from this group and stop receiving emails from it, send an email to beagleboard...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
--
For more options, visit http://beagleboard.org/discuss
---
You received this message because you are subscribed to the Google Groups "BeagleBoard" group.
To unsubscribe from this group and stop receiving emails from it, send an email to beagleboard...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Zpráva neobsahuje viry.
Zkontrolováno AVG - www.avg.cz
Verze: 2015.0.5315 / Virová báze: 4176/8340 - Datum vydání: 7.10.2014
Tomáš Franke <tom...@volny.cz> wrote:
> [-- text/plain, encoding quoted-printable, charset: UTF-8, 52 lines --]
>
> This Bash bug can be abused when running the web server with CGI
> scripts, only.
>
... and even then only if:-
The web server is internet facing (unless you have enemies on your
LAN of course!)
The web server's CGI scripts use bash, they often use other shells
or even don't use a shell at all.