<p dir="ltr">If an attacker has remote control of environment variables think of the damage that can be done with LD_LIBRARY_PATH. Upload a file to a harmless path on webserver and use the library path to link it into an executable running in a CGI env. Instant remote code execution.</p>
<p dir="ltr">Many applications have buffer overflows in environment handling. Remote code execution or denial of service.</p>
<p dir="ltr">Basically environment variables are not terribly secure and have not received a lot of security analysis. If you let an attacker control them for a process running as another user there are probably vectors there. <br><br></p>
<p dir="ltr">Mark </p>
<div class="gmail_quote">On Sep 25, 2014 8:55 AM, "Michael Mol" <<a href="mailto:mikemol@gmail.com">mikemol@gmail.com</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On Thu, Sep 25, 2014 at 8:16 AM, Adam Tauno Williams<br>
<<a href="mailto:awilliam@whitemice.org">awilliam@whitemice.org</a>> wrote:<br>
> On Wed, 2014-09-24 at 15:08 -0400, Mark Farver wrote:<br>
>> I think it is a stretch to label this remotely exploitable.<br>
><br>
> Ditto. This is a theoretical exploit of a system that has issues.<br>
<br>
I'd like to hear your explanation of this. Why would a system have to<br>
have "issues" for this to be exploitable? (Outside of the obvious that<br>
it's running a vulnerable version of bash.)<br>
<br>
--<br>
:wq<br>
_______________________________________________<br>
grlug mailing list<br>
<a href="mailto:grlug@grlug.org">grlug@grlug.org</a><br>
<a href="http://shinobu.grlug.org/cgi-bin/mailman/listinfo/grlug" target="_blank">http://shinobu.grlug.org/cgi-bin/mailman/listinfo/grlug</a><br>
</blockquote></div>