From owner-freebsd-security@FreeBSD.ORG Mon Sep 29 07:25:39 2014 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 2E895964 for ; Mon, 29 Sep 2014 07:25:39 +0000 (UTC) Received: from rack.patpro.net (rack.patpro.net [193.30.227.216]) by mx1.freebsd.org (Postfix) with ESMTP id E9BBAC70 for ; Mon, 29 Sep 2014 07:25:38 +0000 (UTC) Received: from patpro.univ-lyon2.fr (patpro.univ-lyon2.fr [159.84.113.250]) by rack.patpro.net (Postfix) with ESMTPSA id E1346550; Mon, 29 Sep 2014 09:16:01 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=patpro.net; s=patpro; t=1411974962; bh=uiMdMntu1ASUxm6fgrtxvoPZ0BShd/G6bgiB4dVKk34=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=UtE3mIQ5odLWDilSqB+ydDR8CXR09xLdX+XBdngGd8vyhlmjHt83eWIwazbshf9kI 6UgSaV6q3MqaIC1YY/QE4HKhgg+N5trnwNdlojoYwY3WNrTfFmCyZelTEk0p4PPHCz 6Q1lPLTxpX0VrWBGqikAxUuHx5/otXNIu/JIqyUQ= Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) Subject: Re: Bash ShellShock bug(s) From: Patrick Proniewski In-Reply-To: <2423691411974542@web12j.yandex.ru> Date: Mon, 29 Sep 2014 09:16:00 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: References: <2423691411974542@web12j.yandex.ru> To: Kuleshov Aleksey X-Mailer: Apple Mail (2.1510) Cc: freebsd-security@freebsd.org X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 29 Sep 2014 07:25:39 -0000 On 29 sept. 2014, at 09:09, Kuleshov Aleksey wrote: > There is a repository https://github.com/hannob/bashcheck with = convenient script to check for vulnerabilities. >=20 > % sh bashcheck=20 > Vulnerable to CVE-2014-6271 (original shellshock) > Vulnerable to CVE-2014-7169 (taviso bug) > Not vulnerable to CVE-2014-7186 (redir_stack bug) > Vulnerable to CVE-2014-7187 (nessted loops off by one) > Variable function parser still active, likely vulnerable to yet = unknown parser bugs like CVE-2014-6277 (lcamtuf bug) >=20 > Does it mean that FreeBSD's sh is subject to such vulnerabilities? No, it just means the script uses bash and your bash is vulnerable. patpro=