Gernot Hassenpflug
2014-09-26 03:02:51 UTC
Hello,
Since 2014-09-24 there is a vulnerability CVE-2014-6271 reported [1]
regarding vulnerability in Bash shell, for Red Hat and CentOS (versions
4 through 7), explained in [3] by example.
Quote from [2]:
"This issue affects all software that uses the Bash shell and parses
values of environment variables. This issue is especially dangerous as
there are many possible ways Bash can be called by an application. Quite
often if an application executes another binary, Bash is invoked to
accomplish this. Because of the pervasive use of the Bash shell, this
issue is quite serious and should be treated as such."
Our company needs me to report on whether there is any vulnerability in
the Shibboleth-related software: Apache module and shibd daemon on the
SP side, in particular.
The shibd daemon communicates through the apache module to the browser,
using SAML, so I expect there to be no use of shell environment
variables here. However, perhaps the daemon calls a program from the
command line at some point, or some related use of environment
variables?
Could someone from the development team confirm whether or not there is
cause for concern or not?
Refs:
[1] http://lists.centos.org/pipermail/centos/2014-September/146099.html
[2] https://access.redhat.com/solutions/1207723
[3] https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
Best regards,
Since 2014-09-24 there is a vulnerability CVE-2014-6271 reported [1]
regarding vulnerability in Bash shell, for Red Hat and CentOS (versions
4 through 7), explained in [3] by example.
Quote from [2]:
"This issue affects all software that uses the Bash shell and parses
values of environment variables. This issue is especially dangerous as
there are many possible ways Bash can be called by an application. Quite
often if an application executes another binary, Bash is invoked to
accomplish this. Because of the pervasive use of the Bash shell, this
issue is quite serious and should be treated as such."
Our company needs me to report on whether there is any vulnerability in
the Shibboleth-related software: Apache module and shibd daemon on the
SP side, in particular.
The shibd daemon communicates through the apache module to the browser,
using SAML, so I expect there to be no use of shell environment
variables here. However, perhaps the daemon calls a program from the
command line at some point, or some related use of environment
variables?
Could someone from the development team confirm whether or not there is
cause for concern or not?
Refs:
[1] http://lists.centos.org/pipermail/centos/2014-September/146099.html
[2] https://access.redhat.com/solutions/1207723
[3] https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
Best regards,
--
Gernot Hassenpflug
Asahi Net, Inc.
Tokyo, Japan
--
To unsubscribe from this list send an email to users-unsubscribe-***@public.gmane.org
Gernot Hassenpflug
Asahi Net, Inc.
Tokyo, Japan
--
To unsubscribe from this list send an email to users-unsubscribe-***@public.gmane.org