Development issues regarding the cerowrt test router project
 help / color / mirror / Atom feed
* [Cerowrt-devel] bash exploit heads up
@ 2014-09-24 21:45 Dave Taht
  2014-09-24 21:51 ` Toke Høiland-Jørgensen
  2014-09-24 21:54 ` Eric S. Johansson
  0 siblings, 2 replies; 4+ messages in thread
From: Dave Taht @ 2014-09-24 21:45 UTC (permalink / raw)
  To: cerowrt-devel

From fiddling with busybox's ash shell... thus far it *does NOT*
appear vulnerable to this.

http://linux.slashdot.org/story/14/09/24/1638207/remote-exploit-vulnerability-found-in-bash

Simple test:

env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

shows vulnerable for bash, not sh, on openwrt and cerowrt. That said,
it makes me nervous. I've never really liked the redir.sh method cero
uses to bounce people to the right web interface... suggestions to do
it in javascript or something safer desired.

and I'm aware that several people do run bash on cero, so be aware of
this issue.

-- 
Dave Täht

https://www.bufferbloat.net/projects/make-wifi-fast

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2014-09-24 22:00 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-09-24 21:45 [Cerowrt-devel] bash exploit heads up Dave Taht
2014-09-24 21:51 ` Toke Høiland-Jørgensen
2014-09-24 21:54 ` Eric S. Johansson
2014-09-24 22:00   ` Eric S. Johansson

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox