{"id":889,"date":"2014-09-29T11:15:00","date_gmt":"2014-09-29T09:15:00","guid":{"rendered":"https:\/\/loeben.net\/blog\/?p=889"},"modified":"2026-03-07T16:33:35","modified_gmt":"2026-03-07T15:33:35","slug":"shellshock-durch-grosszuegige-bash-variablen","status":"publish","type":"post","link":"https:\/\/loeben.net\/blog\/shellshock-durch-grosszuegige-bash-variablen\/","title":{"rendered":"SHELLSHOCK durch gro\u00dfz\u00fcgige BASH Variablen"},"content":{"rendered":"\n<figure class=\"wp-block-image alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.golem.de\/1409\/sp_109439-86766-i_rc.jpg\" alt=\"bash\" width=\"150\" height=\"85\" title=\"\"><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-thumbnail\"><a href=\"https:\/\/loeben.net\/blog\/wp-content\/uploads\/2022\/03\/20140408.10_23.nsa_.png\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/loeben.net\/blog\/wp-content\/uploads\/2022\/03\/20140408.10_23.nsa_-150x150.png\" alt=\"Heartbleed CVE-2014-0160 Verwundbarkeit\" class=\"wp-image-890\" title=\"\"><\/a><figcaption>Herzblut<\/figcaption><\/figure>\n\n\n\n<p>Nachdem uns im Fr\u00fchjahr 2014\u00a0<strong><a href=\"http:\/\/de.wikipedia.org\/wiki\/Heartbleed\" target=\"_blank\" rel=\"noreferrer noopener\">Herzblut<\/a><\/strong> <a href=\"http:\/\/loeben.net\/images\/20140408.10_23.nsa.png\"><\/a>in Wallung gebracht hat, gibt es in diesen Tagen turbulente\u00a0<a href=\"http:\/\/de.wikipedia.org\/wiki\/Shellshock_%28Sicherheitsl%C3%BCcke%29\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ShellShock<\/strong><\/a>\u00a0Stunden f\u00fcr die SysAdmins von Linux-Serven. Nicht nur die Webhostingbranche ist gefordert und studiert aktuell viele Announcementlisten und patchen betroffene Server. Dabei ist das schnellstm\u00f6gliche Reagieren \u00fcberlebenswichtig, weil die Sicherheitsl\u00fccke so einfach ausgenutzt werden kann. Die\u00a0<a href=\"https:\/\/isc.sans.edu\/images\/status.gif\" target=\"_blank\" rel=\"noopener\">Internetwetterampel<\/a>\u00a0des SANS-Institutes war sogar wieder einige Tage gelb gef\u00e4rbt.<a href=\"http:\/\/isc.sans.edu\/images\/status.gif\" target=\"_blank\" rel=\"noopener\"><\/a>Ursache war diesmal ein schwerwiegender Bug in der meistverwendeten\u00a0<a href=\"http:\/\/de.wikipedia.org\/wiki\/Bash_%28Shell%29\" target=\"_blank\" rel=\"noreferrer noopener\">Shell<\/a>\u00a0von Linux-Servern. ShellShock\u00a0 Angriffsvektoren waren\/sind das Ziel nicht gepatchter bash Installationen in allen Linux-Systemen. Das sind nicht nur die Webserver im Internet. Nein inzwischen geh\u00f6ren dazu auch eine ganze Reihe von &#8222;<a href=\"http:\/\/de.wikipedia.org\/wiki\/Embedded_Linux\" target=\"_blank\" rel=\"noreferrer noopener\">embedded Linuxsystemen<\/a>&#8222;, die auch als &#8222;<a href=\"http:\/\/de.wikipedia.org\/wiki\/Internet_der_Dinge\" target=\"_blank\" rel=\"noreferrer noopener\">Internet der Dinge<\/a>&#8220; (<a href=\"https:\/\/de.wikipedia.org\/wiki\/Internet_der_Dinge\" target=\"_blank\" rel=\"noreferrer noopener\">IoT<\/a>) bezeichnet werden. Technische Details beschreibt zu der ShellShock-Verwundbarkeit HeiseSecurity u.a.\u00a0<a href=\"http:\/\/heise.de\/-2403305\" target=\"_blank\" rel=\"noreferrer noopener\">hier.<\/a><\/p>\n\n\n\n<!--more-->\n\n\n\n<p>In dem folgenden YouTube Video<em><strong>\u201cShellShock bash code injection vulnerability&#8220;<\/strong><\/em>&nbsp;erkl\u00e4rt Johannes B. Ullrich vom SANS Institut auf welche Angriffsvektoren Systemadmins sich diesmal einstellen m\u00fcssen bzw. mussten.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"\u201cShellshock\u201d bash code injection vulnerability\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/xxDPEalJNU8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>Meine Empfehlungen lauten:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Stellen Sie fest, welche bash Version Sie auf Ihrem(n) Server(n) verwenden.<\/li><li>Installieren Sie umgehend die oben empfohlenen Updates.<\/li><\/ul>\n\n\n\n<p><strong>Weiterf\u00fchrende Links:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Heisec&nbsp;<a href=\"http:\/\/heise.de\/-2404788\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/heise.de\/-2404788<\/a><\/li><li>RHEL&nbsp;<a href=\"https:\/\/access.redhat.com\/articles\/1200223\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/access.redhat.com\/articles\/1200223<\/a><\/li><li>SANS Institut ISC&nbsp;<a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Update+on+CVE-2014-6271+Vulnerability+in+bash+shellshock+\/18707\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/isc.sans.edu\/forums\/diary\/Update+on+CVE-2014-6271+Vulnerability+in+bash+shellshock+\/18707<\/a><\/li><li>Golem&nbsp;<a href=\"http:\/\/www.golem.de\/news\/linux-shell-bash-sicherheitsluecke-erlaubt-codeausfuehrung-auf-servern-1409-109439.html\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.golem.de\/news\/linux-shell-bash-sicherheitsluecke-erlaubt-codeausfuehrung-auf-servern-1409-109439.html<\/a><\/li><li>Wikipedia&nbsp;<a href=\"http:\/\/de.wikipedia.org\/wiki\/Embedded_Linux\" target=\"_blank\" rel=\"noopener\">http:\/\/de.wikipedia.org\/wiki\/Embedded_Linux<\/a><\/li><li>Shellshock Epilog&nbsp;<a href=\"http:\/\/heise.de\/-2412822\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/heise.de\/-2412822<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Nachdem uns im Fr\u00fchjahr 2014\u00a0Herzblut in Wallung gebracht hat, gibt es in diesen Tagen turbulente\u00a0ShellShock\u00a0Stunden f\u00fcr die SysAdmins von Linux-Serven. Nicht nur die Webhostingbranche ist gefordert und studiert aktuell viele Announcementlisten und patchen betroffene Server. Dabei ist das schnellstm\u00f6gliche Reagieren \u00fcberlebenswichtig, weil die Sicherheitsl\u00fccke so einfach ausgenutzt werden kann. Die\u00a0Internetwetterampel\u00a0des SANS-Institutes war sogar wieder einige [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[13,1290],"tags":[761,507,505,504],"class_list":["post-889","post","type-post","status-publish","format-standard","hentry","category-datenschutz-datensicherheit","category-oss","tag-common-vulnerabilities-and-exposures","tag-cve-2014-6271","tag-heartbleed","tag-shellshock"],"_links":{"self":[{"href":"https:\/\/loeben.net\/blog\/wp-json\/wp\/v2\/posts\/889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/loeben.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/loeben.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/loeben.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/loeben.net\/blog\/wp-json\/wp\/v2\/comments?post=889"}],"version-history":[{"count":6,"href":"https:\/\/loeben.net\/blog\/wp-json\/wp\/v2\/posts\/889\/revisions"}],"predecessor-version":[{"id":1485,"href":"https:\/\/loeben.net\/blog\/wp-json\/wp\/v2\/posts\/889\/revisions\/1485"}],"wp:attachment":[{"href":"https:\/\/loeben.net\/blog\/wp-json\/wp\/v2\/media?parent=889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/loeben.net\/blog\/wp-json\/wp\/v2\/categories?post=889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/loeben.net\/blog\/wp-json\/wp\/v2\/tags?post=889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}