$ curl -s https://raw.githubusercontent.com/hannob/bashcheck/master/bashcheck | bash
Not vulnerable to CVE-2014-6271 (original shellshock)
Not vulnerable to CVE-2014-7169 (taviso bug)
bash: line 18: 14885 Segmentation fault: 11 bash -c "true $(printf '<<EOF %.0s' {1..79})" 2> /dev/null
Vulnerable to CVE-2014-7186 (redir_stack bug)
Test for CVE-2014-7187 not reliable without address sanitizer
Variable function parser inactive, likely safe from unknown parser bugs
"Variable function parser inactive" -- interesting, did they apply the unofficial patch to namespace-prefix function definitions? This poster[0] seems to not have it, though. Who is right? The test at that github link seems a bit sketchy, by using a simple name like "a" instead of, say, __test_bashbug_a, and not checking the output very thoroughly. But it seems like it would fail the other way if there's a command named "a" in OS X's PATH...
Also reproduced on 10.9.5 -- you would think that there's sometone at Apple looking at this forum and at hannob's bashcheck and that it would get tested. I guess there will be a 1.1 version of the update soon?
Is there a reason why this is not coming via the regular software update? I don't think a lot of people are watching Apple's support pages for updates.
Note that Apple has not provided updates for older systems. If you have an older system and wish to patch, I have been keeping my blog post [1] updated along with the canonical StackExchange answer [2].
Note that the patch from Apple allows bash functions to be escaped, albeit with a BASH_FUNC prefix - but you can get around this by using:
$ env '__BASH_FUNC<ls>()'="() { echo Game Over; }" bash -c ls
Hmph, the other thread fell off the front page, but:
There is a handy zsh script (zsh is in /bin on OSX by default) to get the Bash tarball from opensource.apple.com, apply patches 52, 53, and 54 from ftp.gnu.org, build it, and then prompt to replace /bin/bash and /bin/sh. Xcode is required, and you have to run "sudo xcodebuild" once to accept the EULA.
Disconcertingly, this doesn't show up in Software Update on my machine running 10.10, but that may be because I'm on the beta. Is this being pushed to the App Store/Software Update for OS' < 10.10?
(For those wondering, the 10.9 installer does not run on 10.10)
Are you running a public-facing Apache server on the beta?
I wouldn't call it disconcerting that they're focusing their resources on released versions of OS X. I'd rather they cover the other CVEs sooner and ship 10.10.0 with no issues[1] when it's done than divert engineering resources to ship a patch for Yosemite.
[1] bash-related issues, at least. Apple's .0 track record speaks for itself.
(master) $ echo $BASH_VERSION
4.3.27(1)-release
(master) $ ./bashcheck
Not vulnerable to CVE-2014-6271 (original shellshock)
Not vulnerable to CVE-2014-7169 (taviso bug)
./bashcheck: line 18: 7675 Segmentation fault: 11 bash -c "true $(printf '<<EOF %.0s' {1..79})" 2> /dev/null
Vulnerable to CVE-2014-7186 (redir_stack bug)
Test for CVE-2014-7187 not reliable without address sanitizer
Variable function parser inactive, likely safe from unknown parser bugs
It seems as though there is no patch that fixes CVE-2014-7186 yet?
I may be wrong here, but I'm pretty sure as long as you aren't running any network services, you are probably ok.
This is a big deal because it's remotely exploitable. But it's only exploitable remotely if you are running a network daemon that somehow invokes bash and sets environment variables without sanitization. Web sharing, SSH in some instances, a few MTAs.
The average user PROBABLY isn't running a daemon that is vulnerable. Though in some cases, you may be and not know it (like if you had turned on Web Sharing at some point)
All of this is not to say that if you can apply the patch, do it.
Most likely nothing. You probably aren't running a web server that shells out to do CGI or something else. Macs don't use shell to do their network config. Those are the 2 biggies in the Linux world right now.
Basically to be vulnerable requires 2 components:
1. You have to be able to get some remote user specified stuff into a environment variable.
2. You have to invoke /bin/sh (calls to system(3)[1] do this, as well as actual shell scripts).
If you just have a non-server mac, there's no huge rush--no one has identified an actual stock service/daemon that is susceptible to the vulnerability.
With Apple stuff it seems like it's best to stay within 2 revisions of the latest OS, especially since they've moved to shorter release cycles (yearly).
Here’s for the crazy ones, the misfits, the trouble makers, the round pegs in the square holes. The ones who see things differently... and are still running Snow Leopard.
[+] [-] Titanous|11 years ago|reply
[+] [-] orblivion|11 years ago|reply
[+] [-] scintill76|11 years ago|reply
https://news.ycombinator.com/item?id=8385819
[+] [-] jonahx|11 years ago|reply
[+] [-] MaysonL|11 years ago|reply
Not vulnerable to CVE-2014-6271 (original shellshock)
Not vulnerable to CVE-2014-7169 (taviso bug)
Not vulnerable to CVE-2014-7186 (redir_stack bug)
Test for CVE-2014-7187 not reliable without address sanitizer
Variable function parser inactive, likely safe from unknown parser bugs
[+] [-] gphil|11 years ago|reply
[+] [-] ten7|11 years ago|reply
[+] [-] unknown|11 years ago|reply
[deleted]
[+] [-] 0x0|11 years ago|reply
And for 10.7: http://support.apple.com/kb/DL1767
Edit: Further information from the announcement is available here: http://lists.apple.com/archives/security-announce/2014/Sep/m...
[+] [-] dewey|11 years ago|reply
[+] [-] pudquick|11 years ago|reply
The direct download pages are published first. It should be showing up on the update servers shortly.
[+] [-] jdnier|11 years ago|reply
[+] [-] adrianN|11 years ago|reply
[+] [-] pudquick|11 years ago|reply
This addresses CVE-2014-6271 and CVE-2014-7169 only. There are currently 6 CVEs listed on the Wikipedia page (not sure which are accurate): http://en.wikipedia.org/wiki/Shellshock_%28software_bug%29#S...
Some protection is better than none and I'm glad to see Apple rapidly responding. But this doesn't fix all the issues known to exist currently.
[+] [-] simme_|11 years ago|reply
[+] [-] saidajigumi|11 years ago|reply
Apple's certainly gotten a late start, but the "1.0" part of the update's name speaks to an expectation that this isn't the end of the line here.
[+] [-] bullfight|11 years ago|reply
[+] [-] X-Istence|11 years ago|reply
[+] [-] porsupah|11 years ago|reply
(Of peripheral interest, whilst checking in the iOS Dev Center, I noticed there's a beta of iOS 8.1)
[+] [-] xyclos|11 years ago|reply
[+] [-] alblue|11 years ago|reply
Note that the patch from Apple allows bash functions to be escaped, albeit with a BASH_FUNC prefix - but you can get around this by using:
$ env '__BASH_FUNC<ls>()'="() { echo Game Over; }" bash -c ls
Game Over
[1] http://alblue.bandlem.com/2014/09/bash-remote-vulnerability....
[2] http://apple.stackexchange.com/questions/146849/
[+] [-] osxrand|11 years ago|reply
Quoted from 0x0
Also for 10.8: http://support.apple.com/kb/DL1768 And for 10.7: http://support.apple.com/kb/DL1767 Edit: Further information from the announcement is available here: http://lists.apple.com/archives/security-announce/2014/Sep/m....
Just posting it here incase someone reads your comment and misses 0x0's
[+] [-] tonteldoos|11 years ago|reply
[+] [-] aspHax0|11 years ago|reply
[+] [-] unknown|11 years ago|reply
[deleted]
[+] [-] unknown|11 years ago|reply
[deleted]
[+] [-] Zarel|11 years ago|reply
I guess us Yosemite users will have to wait for the next beta...
[+] [-] unspecified|11 years ago|reply
There is a handy zsh script (zsh is in /bin on OSX by default) to get the Bash tarball from opensource.apple.com, apply patches 52, 53, and 54 from ftp.gnu.org, build it, and then prompt to replace /bin/bash and /bin/sh. Xcode is required, and you have to run "sudo xcodebuild" once to accept the EULA.
https://github.com/tjluoma/bash-fix
This is the easiest way I've found to patch the system-level /bin/bash AND /bin/sh binaries.
[+] [-] kazazes|11 years ago|reply
(For those wondering, the 10.9 installer does not run on 10.10)
[+] [-] pflats|11 years ago|reply
I wouldn't call it disconcerting that they're focusing their resources on released versions of OS X. I'd rather they cover the other CVEs sooner and ship 10.10.0 with no issues[1] when it's done than divert engineering resources to ship a patch for Yosemite.
[1] bash-related issues, at least. Apple's .0 track record speaks for itself.
[+] [-] sigzero|11 years ago|reply
[+] [-] brynmathias|11 years ago|reply
If you didn't do this: cmd + s to boot in safe mode. /sbin/mount -wu / and chmod bash back to a useable state, if you get stuck at log in.
[+] [-] bstream|11 years ago|reply
[+] [-] thebiglebrewski|11 years ago|reply
[+] [-] k_roy|11 years ago|reply
This is a big deal because it's remotely exploitable. But it's only exploitable remotely if you are running a network daemon that somehow invokes bash and sets environment variables without sanitization. Web sharing, SSH in some instances, a few MTAs.
The average user PROBABLY isn't running a daemon that is vulnerable. Though in some cases, you may be and not know it (like if you had turned on Web Sharing at some point)
All of this is not to say that if you can apply the patch, do it.
[+] [-] __david__|11 years ago|reply
Basically to be vulnerable requires 2 components:
If you just have a non-server mac, there's no huge rush--no one has identified an actual stock service/daemon that is susceptible to the vulnerability.[1] "man 3 system"
[+] [-] prawn|11 years ago|reply
[+] [-] gnarbarian|11 years ago|reply
[+] [-] unknown|11 years ago|reply
[deleted]
[+] [-] mikeryan|11 years ago|reply
http://www.pcworld.com/article/2688672/two-scenarios-that-wo...
[+] [-] unknown|11 years ago|reply
[deleted]
[+] [-] tehwalrus|11 years ago|reply
[+] [-] amatheus|11 years ago|reply
Source: http://www.512pixels.net/blog/2014/9/apple-posts-bash-update...
[+] [-] jcurbo|11 years ago|reply
http://arstechnica.com/apple/2014/03/snow-leopard-updates-ar...
With Apple stuff it seems like it's best to stay within 2 revisions of the latest OS, especially since they've moved to shorter release cycles (yearly).
[+] [-] mattyohe|11 years ago|reply
[+] [-] tehwalrus|11 years ago|reply
[+] [-] GeorgeOfTJungle|11 years ago|reply
Here’s for the crazy ones, the misfits, the trouble makers, the round pegs in the square holes. The ones who see things differently... and are still running Snow Leopard.
[+] [-] mjcohen|11 years ago|reply
[+] [-] unknown|11 years ago|reply
[deleted]
[+] [-] unknown|11 years ago|reply
[deleted]