[OpenSIPS-Users] [IMPORTANT] Shellshock bash vulnerability and OpenSIPS

Jens Sauer sauer.jens at yahoo.de
Wed Oct 1 21:49:18 CEST 2014


Hello Chircu,

thanks for the information.

regards

Jens Sauer



Liviu Chircu <liviu at opensips.org> schrieb am 20:56 Mittwoch, 1.Oktober 2014:
 


Hello all,

The following email addresses a serious security issue (10/10 note
      on severity) which may/may not affect existing
OpenSIPS-based platforms. [1]

The issue was disclosed in September and is commonly named
      "Shellshock". You can read all about it on Wikipedia [2].
Long story short, it is a GNU Bash vulnerability in the code which
      handles environment variables.

It also seems that under the "right conditions", any version of an
      OpenSIPS server can be vulnerable to this exploit.

The following are the "right conditions":
    * your /bin/sh is vulnerable to Shellshock. You can test this
      with the following command:
        env x='() { :;}; echo vulnerable' bash -c 'echo this is a
      test'
    * your OpenSIPS uses the "exec" module
    * you have not disabled the "setvars" modparam of exec [3]

If all of the above conditions are true, then you are vulnerable to some cleverly crafted INVITE requests. An attacker
could remotely execute code with the privileges of your OpenSIPS
      daemon user!

Ways to fix the issue (any of them is enough):
    * upgrade your bash shell to a non-vulnerable version
    * if you are not using the environment variables in your exec
      scripts, then skip them:
        modparam("exec", "setvars", 0)

Note on broken backwards-compatibility:
    We have disabled the "setvars" parameter by default in all
      supported OpenSIPS versions. If you were using the
environment variables in your exec scripts, make sure you update
      your OpenSIPS script and bash shell after
performing an upgrade to the daily OpenSIPS builds.

[1]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
[2]: http://en.wikipedia.org/wiki/Shellshock_(software_bug)
[3]: http://www.opensips.org/html/docs/modules/1.12.x/exec.html#id248413

Best regards,
 
-- 
Liviu Chircu
OpenSIPS Developer http://www.opensips-solutions.com
_______________________________________________
Users mailing list
Users at lists.opensips.org
http://lists.opensips.org/cgi-bin/mailman/listinfo/users
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensips.org/pipermail/users/attachments/20141001/05b9fd36/attachment-0001.htm>


More information about the Users mailing list