Sponsored Content
Special Forums Cybersecurity 'Shell Shock' vulnerability in Bourne shell Post 302918948 by cjcox on Friday 26th of September 2014 10:23:35 AM
Old 09-26-2014
You can apply the incomplete patches today and wait for the complete patch when available.

If that's not doable, make sure you use something other than bash (e.g. ksh, dash, ash, etc) for the shell on anything exposed or indirectly exposed. The flaw is huge and very exploitable from a remote host especially for web based stuff. And there are very popular *panels* (hint) that have such exposures.

For all of you that think all scripts should be written in unportable bash... maybe that wasn't the greatest strategy eh?? Bourne shell for the win!
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Bourne Shell and Arrays

Hi everyone, first post here so please be gentle :-) I normally likle to script in Bourne Shell simply for guarenteed compatibility across any system I might run across but this latest problem has me stumped. Arrays is a rather significant construct missing from sh and after finding a way to... (2 Replies)
Discussion started by: Unbeliever
2 Replies

2. UNIX for Dummies Questions & Answers

Bourne-again shell

Hi guys !! well i'm still new in learning UNIX , and actually i'm still studying it by myself .. anyway, some people told me the Bourne-again shell is a good version of UNIX to work on , and i tried to download yesterday but i didn't know how to start it ...... the ReadMe file associated with... (3 Replies)
Discussion started by: mrsamer
3 Replies

3. UNIX for Dummies Questions & Answers

bourne shell or korn shell?

Hi, I have a script that uses "nohup" command to execute a korn shell script. Which one is the correct shell to use bourne shell or korn shell to execute a korn shell? and why? Thanks in advanced. (2 Replies)
Discussion started by: XZOR
2 Replies

4. Shell Programming and Scripting

C shell & Bourne Shell

Hi Guys, My first post and simple one at that .. Really rusty with this shell scripting..\ I have a script called .. j.sh I am calling > j.sh LOG_PATH $BLMBRGDATA/blmbrg.properties where j.sh is grep $1 $2 | cut -d',' -f2 . $BLMBRGDATA is set to a directory path. why do i get :- $... (3 Replies)
Discussion started by: jsm66
3 Replies

5. Shell Programming and Scripting

I need to understand the differences between the bash shell and the Bourne shell

I do not claim to be an expert, but I have done things with scripts that whole teams of folks have said can not be done. Of course they should have said we do not have the intestinal fortitude to git-r-done. I have been using UNIX actually HPUX since 1992. Unfortunately my old computer died and... (7 Replies)
Discussion started by: awk_sed_hello
7 Replies

6. Shell Programming and Scripting

How to activate Korn Shell functionnalities in Bourne Shell

Hi All I have writing a Korn Shell script to execute it on many of our servers. But some servers don't have Korn Shell installed, they use Borne Shell. Some operations like calculation don't work : cat ${file1} | tail -$((${num1}-${num2})) > ${file2} Is it possible to activate Korn Shell... (3 Replies)
Discussion started by: madmat
3 Replies

7. Shell Programming and Scripting

Is there any command in the Bourne shell?

Hi, The problem I have is that I want to create a list of folders whose names are read from a text file but the file names are in decimal. Each letter consists of an octet and the end of the folder name is defined by the white space character (0032) For example, we have in the text... (2 Replies)
Discussion started by: Gengis-Kahn
2 Replies

8. Shell Programming and Scripting

help with bourne shell script

Attempting to write a script to eventually notify me via email for when there is packetloss across the backbone. I am looking for values greater than 0% in the mtr field. #!/bin/sh target=www.google.com date +"%D"_"%T" >> /home/rich/mtr.log echo "----------------------------------------" >>... (1 Reply)
Discussion started by: closedown
1 Replies

9. Shell Programming and Scripting

Bourne/C shell help

Exercise Five Write a Bourne shell script which: • Professionalism: plan for this from the start. • Has one command line argument. • If the command line argument is a directory then the script should output the number of files in the directory. • If the command line argument is an ordinary... (2 Replies)
Discussion started by: moesom
2 Replies

10. Shell Programming and Scripting

Bourne shell & Korn shell

Could some one tell me the difference btw Bourne shell and the Kshell? Which is more flexible and reliable in terms of portability and efficiency. When i type the following command .. $ echo $SHELL yields me /bin/sh Does this tells me that I am in Bourne shell. If yes, how can i get... (6 Replies)
Discussion started by: bobby1015
6 Replies
DEBSECAN(1)															       DEBSECAN(1)

NAME
debsecan - Debian Security Analyzer SYNOPSIS
debsecan options... DESCRIPTION
debsecan analyzes the list of installed packages on the current host and reports vulnerabilities found on the system. OPTIONS
--suite count Choose a specific suite. debsecan produces more informative output (including obsolete packages) if the correct suite is specified. The release code name has to be used ("sid"), not the temporal name ("unstable"). --whitelist file Change the name of the whitelist file. --add-whitelist, --remove-whitelist, --show-whitelist Add or remove entries from the whitelist, or print the whitelist to standard output. See the CHANGING THE WHITELIST section below. --source url Override the default download URL for vulnerability data. --status file Evaluate a different dpkg status file. --format format Change the output format. If format is summary (the default), a short summary for each vulnerability is printed. The simple format is like the summary format, except that only the bug packages names are printed. For bugs and packages, debsecan lists the names of vulnerabilities and binary packages, respectively. --format detail requests a verbose output format, showing all available data. The report format is used for email reports. --line-length characters Specifies the line length in report mode. The default is 72. --mailto mailbox The --mailto option instructions debsecan to the send the report to the email address mailbox. No report is sent if there where no changes since the last invocation with --update-history. This option requires the --format report output format. The option value may contain macros, see the section CONFIGURATION FILE MACROS below. --only-fixed Only list vulnerabilities for which a fix is available in the archive. Note that it can happen that a fix is listed, although the package has not been built for the system's architecture and is not yet available for download. (If you use this option, you also must specify the correct suite using --suite.) --no-obsolete Do not list any obsolete packages (see below). Using this option is not recommended because it hides real vulnerabilities on some systems, not just false positives. --history file Change the name of the history file used by --format report. --update-history Update the vulnerability status information after reporting it using --format report. --cron Internal option used for invocations from cron. Checks if the vulnerability data has already been downloaded today. In this case, further processing is skipped. See debsecan-create-cron(8) for instructions how to create a suitable cron entry. --config file Sets the location of the configuration file. --help Display a short help message and exit. --version Display version information and exit. CONFIGURATION FILE
The configuration file contains the following variables. It follows name=value shell syntax. If value contains white space, it must be surrounded by double quotes. Some variables may contain macros; see the section CONFIGURATION FILE MACROS below. MAILTO Sets the email address to which reports are sent in --cron mode. May contain macros. REPORT Controls whether debsecan does any processing whatsoever in --cron mode. (Permitted values: true and false.) SOURCE Controls the URL from which vulnerability information is fetched. If empty, the built-in default is used. SUITE Sets the default value of the --suite option (see there). SUBJECT Changes the subject line of reports. May contain macros. CONFIGURATION FILE MACROS
Macro processing replaces strings of the form %s(key)s with system-dependent values. Support keys are: hostname The host name on which debsecan runs, without the domain name part. fqdn The fully-qualified domain name of the host on which debsecan runs. ip The IP address of the host on which debsecan runs. This may be inaccurate on multi-homed systems. CHANGING THE WHITELIST
You can use the --add-whitelist and --remove-whitelist options to change the whitelist. Whitelisted vulnerabilities are not included in the reports. For example, debsecan --add-whitelist CVE-2005-4601 ignores the vulnerability CVE-2005-4601 completely, while debsecan --add-whitelist CVE-2005-4601 perlmagick ignores it only as far as the perlmagick is concerned. (This is the same format that is produced by the --format simple option.) To remove all whitelist entries for the CVE-2005-4601 vulnerability, use: debsecan --remove-whitelist CVE-2005-4601 If you want to remove an entry for a specific vulnerability/package pair, list the package name explicitly, as in: debsecan --remove-whitelist CVE-2005-4601 imagemagick You can list multiple vulnerability and packages. For example, debsecan --add-whitelist CVE-2005-4601 CVE-2006-0082 imagemagick perlmagick whitelists CVE-2005-4601 for all packages, and CVE-2006-0082 for the imagemagick and perlmagick packages only. CAVEATS
Much like the official Debian security advisories, debsecan's vulnerability tracking is mostly based on source packages. This can be con- fusing because tools like dpkg only display binary package names. Therefore, debsecan displays the more familiar binary package names. This has the unfortunate effect that all binary packages (including packages containing only documentation, for example) are flagged as vulnerable, and not only those packages which actually contain the vulnerable code. If the correct --suite option is specified, debsecan may mark some packages as obsolete. This means that the binary package in question has been removed from the archive. In this case, you need to update all the packages depending on the obsolete package, and subsequently remove the obsolete package. For certain architectures, build daemons may lag considerably. In such case, debsecan may incorrectly mark a package as fixed, even if an update is not yet available in the Debian archive. Note that debsecan version uses the --suite option only to determine the availability of corrected packages and to detect obsolete pack- ages. If you specify the wrong suite, only the information on available security updates and obsolete packages is wrong, but the list of vulnerabilities is correct. Mixing packages from different Debian releases is supported, as long as the packages still carry their official version numbers. Unknown package versions (from backported packages, for example) are compared to the version in Debian unstable only, which may lead to incorrect reports. EXAMPLES
This command prints all package names for which security fixes are available: debsecan --suite suite --format packages --only-fixed If you pass this output to apt-get, you can download new packages which contain security fixes. For example, if you are running sid: apt-get install $(debsecan --suite sid --format packages --only-fixed) The following command can be invoked periodically, to get notifications of new security issues: debsecan --suite suite --format report --update-history --mailto root See debsecan-create-cron(8) for a tool which creates a suitable cron entry. ENVIRONMENT
http_proxy This environment variable instructs debsecan to use a proxy server to fetch the vulnerability data. It must be of the form http://proxy.example.net:8080/ (mimicking a URL). FILES
/etc/default/debsecan Built-in location of the configuration file. /var/lib/dpkg/status File from which the package information is fetched by default. AUTHOR
debsecan was written by Florian Weimer. SEE ALSO
dpkg(1), debsecan-create-cron(8), apt-get(8) 2005-12-23 DEBSECAN(1)
All times are GMT -4. The time now is 09:34 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy