Re: Proposed simple shell-shock protection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 29 Sep 2014, at 19:41, Pete Houston wrote:

> It is not a flaw in apache. Apache is simply a network-enabled channel
> through which exploitative payloads may be delivered to unpatched
> installations of bash (one of many such channels).

Yep.  mod_taint (or any other Apache-based solution) is secondary protection.
Updating bash must be your primary defence.

Your system may not be vulnerable in the first place.  If bash isn't
your default shell then the chances of it getting invoked by anything
running under apache are very remote.  Check #!/bin/sh: if it's a
not link to bash then the chances of bash ever being reachable through
apache are very remote unless/until your attacker already owns you.

If you want to be properly paranoid, run apache in a VM or chroot jail
with no bash at all!

-- 
Nick Kew

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx





[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux