Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5422F1AB.9080604@redhat.com>
Date: Wed, 24 Sep 2014 18:30:35 +0200
From: Florian Weimer <fweimer@...hat.com>
To: oss-security@...ts.openwall.com
CC: chet.ramey@...e.edu
Subject: Re: CVE-2014-6271: remote code execution through bash

On 09/24/2014 06:23 PM, Michal Zalewski wrote:
> Note that on Linux systems where /bin/sh is symlinked to /bin/bash,
> any popen() / system() calls from within languages such as PHP would
> be of concern due to the ability to control HTTP_* in the env.

This depends on how PHP is invoked.  mod_php does not set the CGI 
environment variables.

However, it is true that if CGI programs spawn subprocesses, they may be 
affected even if the CGI program itself is not written in bash.

-- 
Florian Weimer / Red Hat Product Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.