Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.

[Shellshock] Linux/Unix bug in bash shell

[es] :: Linux :: [Shellshock] Linux/Unix bug in bash shell

Strane: < .. 1 2 3

[ Pregleda: 90988 | Odgovora: 43 ] > FB > Twit

Postavi temu Odgovori

Autor

Pretraga teme: Traži
Markiranje Štampanje RSS

Mister Big Time
The Consigliere
enterparadajz
Belgrade

Član broj: 15306
Poruke: 4746

Sajt: www.go2bed.net


Profil

icon Re: [Shellshock] Linux/Unix bug in bash shell06.11.2014. u 08:55 - pre 989 dana i 19h
Posle Heartbleed-a, Shelldock. Neko ocigledno ima stila

There are wars that can't be won.

IT'S ALL THE SAME,
ONLY THE NAMES WILL CHANGE.

 
Odgovor na temu

lega99

Član broj: 82119
Poruke: 621



Profil

icon Re: [Shellshock] Linux/Unix bug in bash shell26.11.2014. u 15:45 - pre 969 dana i 13h
Izgleda da je neko u mom kraju lepo iskoristio taj bug, ruteri nisu azurirani.

Cambridge Industries(Group) Co.,Ltd RTL8xxx CIG WPA-PSK + WPA2-PSK
starting wpa handshake capture on "rxxxx"
new client found: 00:20:00:80:89:09

TP-LINK TECHNOLOGIES CO., LTD. RTL8xxx CIG WPA-PSK + WPA2-PSK
starting wpa handshake capture on "Oxxxx"
new client found: 00:20:00:80:89:09

TP-LINK TECHNOLOGIES CO., LTD. Ralink Wireless Access Point RalinkAPS WPA-PSK + WPA2-PSK TKIP+CCMP
starting wpa handshake capture on "Kxxxx"
new client found: 00:20:00:80:89:09

Tri razlicita rutera, klijent isti, seta covek od rutera do rutera, najverovatnije je i setovao svoju MAC
adresu u belu listu na svakom ruteru.

[Ovu poruku je menjao lega99 dana 26.11.2014. u 17:33 GMT+1]
 
Odgovor na temu

makajislavko
nezaposlen
Kula

Član broj: 205483
Poruke: 16
*.dynamic.isp.telekom.rs.



Profil

icon Re: [Shellshock] Linux/Unix bug in bash shell20.01.2016. u 13:19 - pre 549 dana i 15h
A sada se pojavio novi BAG
A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released this morning by Perception Point.

"This affects all Android phones KitKat and higher," said Yevgeny Pats, co-founder and CEO at security vendor Perception Point.

Any machine with Linux Kernel 3.8 or higher is vulnerable, he said, including tens of millions of Linux PCs and servers, both 32-bit and 64-bit. Although Linux lags in popularity on the desktop, the operating system dominates the Internet, mobile, embedded systems and the Internet of Things, and powers nearly all of the world's supercomputers.

Using this vulnerability, attackers are able to delete files, view private information, and install unwanted programs.

According to Pats, this vulnerability has existed in the Linux kernel since 2012.

Pats said that the Linux team has been notified, and patches should be available and pushed out soon to devices with automatic updates. Perception Point has also created proof of concept code that exploits this vulnerability to gain root access.

http://www.infoworld.com/artic...of-linux-pcs.html#tk.rss_linux
makaji
 
Odgovor na temu

lega99

Član broj: 82119
Poruke: 621



Profil

icon Re: [Shellshock] Linux/Unix bug in bash shell09.01.2017. u 13:12 - pre 194 dana i 15h
Exploit samo 9 godina, auuuuu, da li je moguce 9 godina, slucajno sam nabasao na Mint forumu.....

Dirty cow Exploit patches


Postby deepakdeshp » Tue Oct 25, 2016 5:51 pm
Dirty cow is a very serious exploit. From which Mint versions have the
patches rolled out in update manager?
Which are the Mint versions not tequiring a patch?
There must be versions for which the patch may not have rolled out.
The youtube video is quite good. Looks like one can become root easily
and destroy the system or a whole network.
The bug has existed since around 2.6.22 (released in 2007) and was fixed
on Oct 18, 2016.
https://youtu.be/kEsshExn7aE
http://thehackernews.com/2016/10/linux-kernel-exploit.html?m=1
 
Odgovor na temu

[es] :: Linux :: [Shellshock] Linux/Unix bug in bash shell

Strane: < .. 1 2 3

[ Pregleda: 90988 | Odgovora: 43 ] > FB > Twit

Postavi temu Odgovori

Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.