Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > gnu.bash.bug > #11361

Re: Integer Overflow in braces

From Eric Blake <eblake@redhat.com>
Newsgroups gnu.bash.bug
Subject Re: Integer Overflow in braces
Date 2015-08-17 16:15 -0700
Organization Red Hat, Inc.
Message-ID <mailman.8509.1439896680.904.bug-bash@gnu.org> (permalink)
References <CABq52TYThGj9OtBn3xTti5scmA=WdnS7ULw3G6GMayPK6WR0+w@mail.gmail.com> <20150817122026.GT4309@eeg.ccf.org> <CABq52TbKZCK8ci5ra_N4pfVB3jXGCdf-ZCG=k35c+_fVehfzFg@mail.gmail.com>

Show all headers | View raw


[Multipart message — attachments visible in raw view] - view raw

On 08/17/2015 09:58 AM, Pasha K wrote:
> Hey Greg,
> 
> I wasn't particularly trying to actually generate that large amount of
> strings in memory, I wa purposely trying to overflow the integer variable
> "nelem"hoping to get Code Execution. This could potentially be a security
> risk as shell shock was just more of a denial of service rather than
> straight up code execution. However, just because I wasn't able to gain
> control of the registers doesn't mean someone else with more skill can't.

This is not a security risk.

Shell shock was a security hole because the shell could be coerced into
executing user-supplied code WITHOUT a way for a script to intervene.

Any poorly-written shell script can do stupid things, including crashing
bash because it overflows the heap by trying to allocate memory for such
a stupidly large expansion.  But unless the problem can be triggered
without a script (the way shell shock executed user code before even
starting to parse a script), then you can't exploit the problem to gain
any more access to the system than you already have by being able to run
a script in the first place.

Fix your script to not do stupid things, like trying an insanely-large
brace expansion, or trying an 'eval' (or similar) on untrusted user
input. But don't call it a bash security hole that bash allows you to
write stupid scripts.

-- 
Eric Blake   eblake redhat com    +1-919-301-3266
Libvirt virtualization library http://libvirt.org

Back to gnu.bash.bug | Previous | Next | Find similar


Thread

Re: Integer Overflow in braces Eric Blake <eblake@redhat.com> - 2015-08-17 16:15 -0700

csiph-web