I’m not worried about any specific use-case, but I’d rather not have vulnerable 
software running on SSVMs in general.

John

On Sep 30, 2014, at 2:47 PM, Sheng Yang 
<sh...@yasker.org<mailto:sh...@yasker.org>> wrote:

The parameters of system() function have been verified as valid IP/netmask
format by script, so I don't think other parameters would be able to slip
in in this case.

--Sheng

On Tue, Sep 30, 2014 at 8:38 AM, Go Chiba 
<go.ch...@gmail.com<mailto:go.ch...@gmail.com>> wrote:

Hi folks,

By my digging, ipcalc included system() function call but debian based our
system vm are using dash as system shell. So I think this shellshock
concern are not directly affected to system vm cgi-bin. right?

GO

from my iPhone

2014/09/30 10:13、Demetrius Tsitrelis 
<demetrius.tsitre...@citrix.com<mailto:demetrius.tsitre...@citrix.com>>
のメッセージ:

http://systemvm-public-ip/cgi-bin/ipcalc is a perl script.

-----Original Message-----
From: Sheng Yang [mailto:sh...@yasker.org]
Sent: Monday, September 29, 2014 5:21 PM
To: <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>>
Subject: Re: Shellshock

http://systemvm-public-ip/cgi-bin/ipcalc is NOT a bash script, so it's
normal that it cannot be exploited.

--Sheng

On Fri, Sep 26, 2014 at 1:57 PM, Demetrius Tsitrelis <
demetrius.tsitre...@citrix.com<mailto:demetrius.tsitre...@citrix.com>> wrote:

Do you mean you tried setting the USER_AGENT like in
https://community.qualys.com/blogs/securitylabs/2014/09/25/qualysguard
-remote-detection-for-bash-shellshock
?


-----Original Message-----
From: Ian Duffy [mailto:i...@ianduffy.ie]
Sent: Friday, September 26, 2014 6:56 AM
To: CloudStack Dev
Subject: Re: Shellshock

Tried this against the latest system vms built on Jenkins.

Didn't get a successful exploited response. Tested against
http://systemvm
- public-ip/cgi-bin/ipcalc
On 25 Sep 2014 16:56, "Abhinandan Prateek" <agneya2...@gmail.com>
wrote:


After heart bleed we are Shell shocked
http://www.bbc.com/news/technology-29361794 !
It may not affect cloudstack directly as it is a vulnerability that
affects bash, and allows the attacker to take control of the system
running bash shell.

-abhi



Stratosec - Secure Finance and Heathcare Clouds
http://stratosec.co
o: 415.315.9385
@johnlkinsella<http://twitter.com/johnlkinsella>

Reply via email to