On Fri, Sep 26, 2014 at 11:57:15AM +0100, Chris Green wrote:
Is there an explanation of the vulnerability in bash out there somewhere? All I've seen so far is panic stricken reports about it, but no sort of explanation.
You need to look harder, there's many good articles out there.
What I don't quite understand is how a hacker ever gets to the point of being able to run bash without having broken into a system already.
http://www.troyhunt.com/2014/09/everything-you-need-to-know-about.html
^^^ because of attack vectors like these, after checking logs (of machines on our CDN) I've seen people actively trying to exploit this a few hours after the announcement.
https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/
^^^ You also have attack vectors like that where just connecting to a lan or wifi network could lead you to having an exploit performed against you.
Adam