<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 12pt;
font-family:Calibri
}
--></style></head>
<body class='hmmessage'><div dir='ltr'><font style="" color="#000000" face="Tahoma,sans-serif">I totally agree. All this security talk you might think we were running national security servers. Human nature is sometimes so bizarre. People can be scared so easily and the media loves scaring people. But then sometimes it takes scare tactics to get someone to take action. Has anyone ever had an Allstar system compromised that was properly setup?<br><br>The fix is easy.<br><br>If you are running centos just do<br><br>yum update bash<br><br>The upcoming Beaglebone Black 1.2 release will have the fix.<br><br>Ubuntu auto updated today.<br><br>Other releases should have similar update paths.<br><br>Run this script at the Linux prompt to test -<br><br> env X="() { :;} ; echo busted" `which bash` -c "echo completed"<br><br>If it returns busted then you have the problem.<br><br>One caveat - the current fixes are preliminary and have not gone through extensive testing to you might want to check for updates again in a fews day or weeks. <br><br></font><b><font style="font-size:16pt;" size="4">73 Doug</font><font style="font-size:16pt;" size="4"><br></font><font style="font-size:16pt;" size="4">WA3DSP</font><font style="font-size:16pt;" size="4"><br></font><font style="font-size:16pt;" size="4">http://www.crompton.com/hamradio</font></b><font style="font-size:16pt;" size="4"><br></font><br><br><div>> Date: Thu, 25 Sep 2014 16:29:30 -0400<br>> From: kb4fxc@inttek.net<br>> To: app_rpt-users@ohnosec.org<br>> Subject: Re: [App_rpt-users] NEW Security Issues<br>> <br>> <br>> Hi Everyone,<br>> <br>> I'm going to try to slow the panic here! WHY is this such a huge security<br>> concern for AllStar users????<br>> <br>> The only remote attack vector that might be of concern is via the apache<br>> webserver. And, this is only a concern if you've got bash shell scripts in<br>> a publicly accessible cgi-bin directory. So, if you do have a vulnerable<br>> cgi-bin, just temporarily do a "chmod 700" on this directory and the<br>> problem is mitigated....Or, just stop the apache service entirely.<br>> <br>> This vulnerability isn't like HeartBleed from several months ago. Nor does <br>> it provide a means for privilege escalation.<br>> <br>> Am I missing something??? (I hope not! I've got over 100 servers with <br>> this vulnerability currently).<br>> <br>> So, slow down and -plan- this fix. Don't break your system due to an <br>> unneeded panic!<br>> <br>> <br>> 73, David KB4FXC<br>> <br>> <br>> <br>> <br>> <br>> On Thu, 25 Sep 2014 mike@midnighteng.com wrote:<br>> <br>> > <br>> > The increase in recent hack attempts are the result of the resent knowlage of a fundamental bug in bash.<br>> > It was not a big deal till someone published the flaw before some patches could be issued.<br>> > <br>> > Some folks set-ups are vulnerable. If you run HTTP, you certainly are.<br>> > <br>> > Just a FYI...<br>> > <br>> > SHELLSHOCK - this is bigger and older than heartbleed.<br>> > <br>> > It is a very big deal for "all" linux systems running http.<br>> > <br>> > http://seclists.org/oss-sec/2014/q3/650 <br>> > <br>> > to check your version of bash, type<br>> > <br>> > cd /bin<br>> > bash --version<br>> > <br>> > our acid installs should be at 3.2<br>> > Remote ssh devices are possibly at risk.<br>> > Current patches may not be entirely effective.<br>> > Much more to be known about this.<br>> > <br>> > google shellshock for more info.<br>> > <br>> > ...mike/kb8jnm<br>> > <br>> > <br>> > <br>> > <br>> <br>> _______________________________________________<br>> App_rpt-users mailing list<br>> App_rpt-users@ohnosec.org<br>> http://ohnosec.org/cgi-bin/mailman/listinfo/app_rpt-users<br>> <br>> To unsubscribe from this list please visit http://ohnosec.org/cgi-bin/mailman/listinfo/app_rpt-users and scroll down to the bottom of the page. Enter your email address and press the "Unsubscribe or edit options button"<br>> You do not need a password to unsubscribe, you can do it via email confirmation. If you have trouble unsubscribing, please send a message to the list detailing the problem. <br>> <br></div> </div></body>
</html>