<div dir="ltr"><div>Replying to myself but I just wanted to make sure I didn't lull anyone into a false sense of security as I hadn't actually _tried_ updating VyOS. Even with an update there is no non-vulnerable bash package for VyOS using the VyOS repository and since vbash is integral (it's how all the router commands are executed) I would be concerned for those with internet-facing VyOS deployments.<br><br></div><div>Filtering off ssh would be a very good idea if it wasn't done already....<br></div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Sep 25, 2014 at 9:06 PM, Nathan Gardiner <span dir="ltr"><<a href="mailto:ngardiner@gmail.com" target="_blank">ngardiner@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div>What's the particular concern with Debian based devices? Debian pushed bash 4.2+dfsg-0.1+deb7u1 for wheezy 14 hours ago and any device which uses the Debian repositories would pick it up with a dist-upgrade/specific package upgrade. Proxmox VE 3.1 hosts not only have the Debian repository but also have inbuilt package update functionality in the GUI which makes it quite easy to update.<br><br></div><div>Openwrt uses ash by default and requires bash to be installed explicitly, VyOS 1.0.4 "vbash" shell I just tested to be vulnerable without an update:<br><br>vyos@r03:~$ show version<br>Version:      VyOS 1.0.4<br>Description:  VyOS 1.0.4 (hydrogen)<br><br>vyos@r03:~$ env x='() { :;}; echo vulnerable'  bash -c "echo this is a test"<br>vulnerable<br>this is a test<span class="HOEnZb"><font color="#888888"><br></font></span></div><span class="HOEnZb"><font color="#888888"><div><br><br></div>Nathan</font></span></div><div class="HOEnZb"><div class="h5"><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Sep 25, 2014 at 8:43 PM, Ben Cooper <span dir="ltr"><<a href="mailto:ben@zeno.io" target="_blank">ben@zeno.io</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">isnt VYoS *nix based? Debian even? <div><br></div><div>Also those new Ubiqiti things are Debian based as well I think.</div></div><div class="gmail_extra"><div><div><br><div class="gmail_quote">On Thu, Sep 25, 2014 at 10:06 PM, George Fong <span dir="ltr"><<a href="mailto:george@lateralplains.com" target="_blank">george@lateralplains.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><u></u>





<div link="#0000ff">
I've so far had no problems updating CENTos servers with a simple update of bash.<br>
<br>
I'm not sure how accurate this test is but the befores and afters seem to be consistent:<br>
<br>
<a href="https://community.qualys.com/blogs/securitylabs/2014/09/24/bash-remote-code-execution-vulnerability-cve-2014-6271" target="_blank">https://community.qualys.com/blogs/securitylabs/2014/09/24/bash-remote-code-execution-vulnerability-cve-2014-6271</a><br>
<br>
Right now I am most worried about Linux based border routers and VM hosts such as Proxmox. The latter is Debian based.<br>
<br>
Cheers<br>
g.<div><div><br>
<br>
<br>
On Thu, 2014-09-25 at 16:32 +1000, Pinkerton, Eric (AU Sydney) wrote:
<blockquote type="CITE">Heads up, shellshock botnet payloads are already hitting honeypots..<br>
<br>
 <br>
<br>
<a href="https://gist.github.com/anonymous/929d622f3b36b00c0be1" target="_blank">https://gist.github.com/anonymous/929d622f3b36b00c0be1</a><br>
<br>
 <br>
<br>
 <br>
<br>
</blockquote>
<blockquote type="CITE"><b>From:</b> AusNOG [mailto:<a href="mailto:ausnog-bounces@lists.ausnog.net" target="_blank">ausnog-bounces@lists.ausnog.net</a>]
<b>On Behalf Of </b>Alex Samad - Yieldbroker<br>
<b>Sent:</b> Thursday, 25 September 2014 2:59 PM<br>
<b>To:</b> Kush, Nishchal<br>
<b>Cc:</b> <a href="mailto:ausnog@lists.ausnog.net" target="_blank">ausnog@lists.ausnog.net</a><br>
<b>Subject:</b> Re: [AusNOG] bash bug !<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
I believe the initial released patch was incomplete<br>
<br>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1146319" target="_blank">https://bugzilla.redhat.com/show_bug.cgi?id=1146319</a><br>
<br>
 <br>
<br>
 <br>
<br>
A<br>
<br>
 <br>
<br>
</blockquote>
<blockquote type="CITE"><b>From:</b> Kush, Nishchal [<a href="mailto:kush@kush.com.fj" target="_blank">mailto:kush@kush.com.fj</a>]
<br>
<b>Sent:</b> Thursday, 25 September 2014 3:03 PM<br>
<b>To:</b> Alex Samad - Yieldbroker<br>
<b>Cc:</b> <a href="mailto:ausnog@lists.ausnog.net" target="_blank">ausnog@lists.ausnog.net</a><br>
<b>Subject:</b> Re: [AusNOG] bash bug !<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
Hi <br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
<br>
</blockquote>
<blockquote type="CITE">Most Linux distributions have released patches. Unfortunately you still need to recompile your own for Apple’s Mac OS X<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
<br>
</blockquote>
<blockquote type="CITE">Cheers<br>
<br>
<br>
</blockquote>
<blockquote type="CITE">--<br>
Kush, Nishchal<br>
<a href="mailto:kush@kush.com.fj" target="_blank">kush@kush.com.fj</a><br>
<br>
<br>
<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
</blockquote>
<blockquote type="CITE">On 25 Sep 2014, at 2:40 pm, Alex Samad - Yieldbroker <<a href="mailto:Alex.Samad@yieldbroker.com" target="_blank">Alex.Samad@yieldbroker.com</a>> wrote:<br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
<a href="http://www.smh.com.au/it-pro/security-it/shell-shock-bash-bug-labelled-largest-ever-to-hit-the-internet-20140925-10ltx1.html" target="_blank">http://www.smh.com.au/it-pro/security-it/shell-shock-bash-bug-labelled-largest-ever-to-hit-the-internet-20140925-10ltx1.html</a><br>
<br>
<a href="https://www.us-cert.gov/ncas/current-activity/2014/09/24/Bourne-Again-Shell-Bash-Remote-Code-Execution-Vulnerability" target="_blank">https://www.us-cert.gov/ncas/current-activity/2014/09/24/Bourne-Again-Shell-Bash-Remote-Code-Execution-Vulnerability</a><br>
<br>
_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br>
<br>
</blockquote>
<blockquote type="CITE"> <br>
<br>
<br>
</blockquote>
<blockquote type="CITE">Please consider the environment before printing this email. This message should be regarded as confidential. If you have received this email in error please notify the sender and destroy it immediately. Statements of intent shall only
 become binding when confirmed in hard copy by an authorised signatory. The contents of this email may relate to dealings with other companies under the control of BAE Systems Applied Intelligence Limited, details of which can be found at <a href="http://www.baesystems.com/Businesses/index.htm" target="_blank">http://www.baesystems.com/Businesses/index.htm</a>.
<pre>_______________________________________________
AusNOG mailing list
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a>
</pre>
</blockquote>
<br>
</div></div><span><font color="#888888"><table width="100%" cellpadding="0" cellspacing="0">
<tbody>
<tr>
<td>-- <br>
<img src="cid:1411646856.2276.47.camel@walrus" align="bottom" border="0"><br>
<br>
<br>
GPG Fingerprint: 8BAF 3175 A1C8 BF5F 3631 BEF4 727C 784A 218B 4CE4 <br>
Just remember, wherever you go ........ there you are. </td>
</tr>
</tbody>
</table>
</font></span></div>

<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br><br clear="all"><div><br></div>-- <br></div></div><div dir="ltr"><div>--</div><div>Ben Cooper</div><div>CEO</div><div>Zeno Holdings PTY LTD<br></div><div>P: <span style="color:rgb(51,51,51);font-family:'lucida grande',tahoma,verdana,arial,sans-serif;font-size:11px;line-height:14.079999923706055px"><a href="tel:%2B61%207%203503%208553" value="+61735038553" target="_blank">+61 7 3503 8553</a></span></div><div>M: 0410411301</div><div>E: <a href="mailto:ben@zeno.io" target="_blank">ben@zeno.io</a></div><div>W: <u><a href="http://zeno.io" target="_blank">http://zeno.io</a></u></div></div>
</div>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br></div>
</div></div></blockquote></div><br></div>