sh is a link to dash.

Don't know the date on the system VM but I believe it is from the April OpenSSL 
update.

-----Original Message-----
From: Go Chiba [mailto:go.ch...@gmail.com] 
Sent: Tuesday, September 30, 2014 12:04 PM
To: dev@cloudstack.apache.org
Subject: Re: Shellshock

hi Demetrius,

Which Date of SystemVM are you using now?
And please share result of "ls -al /bin/sh" on your System VM.

from my iPhone

2014/10/01 3:42、Demetrius Tsitrelis <demetrius.tsitre...@citrix.com> のメッセージ:

> When I do "echo $SHELL" on the Virtual Router instance I see "/bin/bash".
> 
> -----Original Message-----
> From: Go Chiba [mailto:go.ch...@gmail.com]
> Sent: Tuesday, September 30, 2014 8:38 AM
> To: dev@cloudstack.apache.org
> Subject: Re: Shellshock
> 
> Hi folks,
> 
> By my digging, ipcalc included system() function call but debian based our 
> system vm are using dash as system shell. So I think this shellshock concern 
> are not directly affected to system vm cgi-bin. right?
> 
> GO
> 
> from my iPhone
> 
> 2014/09/30 10:13、Demetrius Tsitrelis <demetrius.tsitre...@citrix.com> のメッセージ:
> 
>> http://systemvm-public-ip/cgi-bin/ipcalc is a perl script.
>> 
>> -----Original Message-----
>> From: Sheng Yang [mailto:sh...@yasker.org]
>> Sent: Monday, September 29, 2014 5:21 PM
>> To: <dev@cloudstack.apache.org>
>> Subject: Re: Shellshock
>> 
>> http://systemvm-public-ip/cgi-bin/ipcalc is NOT a bash script, so it's 
>> normal that it cannot be exploited.
>> 
>> --Sheng
>> 
>>> On Fri, Sep 26, 2014 at 1:57 PM, Demetrius Tsitrelis < 
>>> demetrius.tsitre...@citrix.com> wrote:
>>> 
>>> Do you mean you tried setting the USER_AGENT like in 
>>> https://community.qualys.com/blogs/securitylabs/2014/09/25/qualysgua
>>> r d -remote-detection-for-bash-shellshock
>>> ?
>>> 
>>> 
>>> -----Original Message-----
>>> From: Ian Duffy [mailto:i...@ianduffy.ie]
>>> Sent: Friday, September 26, 2014 6:56 AM
>>> To: CloudStack Dev
>>> Subject: Re: Shellshock
>>> 
>>> Tried this against the latest system vms built on Jenkins.
>>> 
>>> Didn't get a successful exploited response. Tested against 
>>> http://systemvm
>>> - public-ip/cgi-bin/ipcalc
>>>> On 25 Sep 2014 16:56, "Abhinandan Prateek" <agneya2...@gmail.com> wrote:
>>>> 
>>>> 
>>>> After heart bleed we are Shell shocked
>>>> http://www.bbc.com/news/technology-29361794 !
>>>> It may not affect cloudstack directly as it is a vulnerability that 
>>>> affects bash, and allows the attacker to take control of the system 
>>>> running bash shell.
>>>> 
>>>> -abhi
>>> 

Reply via email to