What happened boss? Someone prune your message due to perception of it leading to a rm -rf 'ing of the interwebs?That's lame.
It was a test code, not a working way to exploit anything.
You can remove my account from this forum. Thanks.
According to http://seclists.org/oss-sec/2014/q3/650, yes.Does anyone know if the latest version (4.3) is also vulnerable?
I would hold off until they release an update that patches the exploit. The recent update didn't fix it completely.I look forward to updating every server that runs bash... eh all of them.
Fortunately this doesn't seem to exploitable under standard server scenario's without a service which allows for the setting of environment variables to specific values (rare) such as SSH access. Atleast based on my understanding.
Update Time....
Puppet...I look forward to updating every server that runs bash... eh all of them.
I also saw the unedited version and PoC shown there by OP was pretty harmless. In addition, bash isn't suid binary and running it on your account limits the damage to what you can access by yourself.Just saw the unedited version of this topic, wasn't the PoC doing almost the same shit the code posted by redhat does?(which, btw, is currently linked in this topic title) :huh:
Yes, and due to stupidity we lost one of the bright members of the forum.Just saw the unedited version of this topic, wasn't the PoC doing almost the same shit the code posted by redhat does?(which, btw, is currently linked in this topic title) :huh:
While the fact that it wasn't much of a PoC was true, him flipping shit on it being removed largely based on a mistake is also a problem.Yes, and due to stupidity we lost one of the bright members of the forum.
Good job, dumbass. (Looks at Martin)
Well aren't you the smart little cookie.Yes, and due to stupidity we lost one of the bright members of the forum.
Good job, dumbass. (Looks at Martin)