News and Announcements What's news on Wolfing? 27 September 2014 01:28 PM Posted by: WolfKodi Shellshock BugViews: 1063 ![]() Bash is used as the default shell or command line interface on almost every single Linux server out there. Gaining access to the server's user interface allows an attacker to gain control over the server. That's almost like passing them your computer's keyboard and mouse. Of course, it is not as simple as an attacker will require the use of an internet-facing service, such as an Apache web server, to get to Bash internally. This is the reason why this bug is also considered as a "backdoor" and called "bashdoor". I have spent this afternoon researching on this issue, understood how the exploit works, and successfully verified through testing that the server Wolfing runs on - Kodi's Wolf Pack is not vulnerable. So why is Wolfing not affected? Thanks to the unique way that the server runs off a router, which is also the case for many embedded systems, the server uses BusyBox and its built-in shell called Ash instead of Bash. While the server did have Bash installed, it was not the default shell which is required for a successful attack. Another added requirement is the use of direct URL CGI scripts which the server uses none of. Either way, I took an extended measure to uninstalled Bash since it is not being used. No Howls Yet |