Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bash Code Injection Vulnerability

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    6 Posts 6 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      webroy
      last edited by

      Is this also a issue in the Pfsense Firewall's? and when will there be a update or how can we update?

      http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        ESF will likely address this soon but bash is not installed in FreeBSD (or pfSense) by default.

        I don't know if any packages install it.  Apparently not snort, squid, OpenVPN Client Export, iperf, or System Patches.

        [2.1.5-RELEASE][root@fw.example.com]/root(1): bash
        bash: Command not found.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • R
          rehilliard951
          last edited by

          It appears that FreeBSD & pFsense isn't vulnerable.

          You can check if you're vulnerable by running the following lines in your default shell, which on many systems will be Bash. If you see the words "busted", then you're at risk. If not, then either your Bash is fixed or your shell is using another interpreter.

          env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
          env X="() { :;} ; echo busted" which bash -c "echo completed"

          1 Reply Last reply Reply Quote 0
          • BismarckB
            Bismarck
            last edited by

            Unfortunately the MailScanner package use bash:

            /usr/local/bin# ls -la | grep bash

            lrwxr-xr-x  1 root  wheel 35 Jun 29 09:55 bash -> /usr/pbi/mailscanner-amd64/bin/bash

            /usr/local/bin# env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
            vulnerable
            this is a test

            I've delete the bash binary, MailScanner is still working but the system is not vulnerably any more.

            1 Reply Last reply Reply Quote 0
            • R
              robi
              last edited by

              Hmmm
              http://stackoverflow.com/questions/26041877/how-to-check-and-upgrade-bash-on-freebsd-related-to-shell-shock-bug

              Hopefully a compiled package will be available soon. A very dirty way to fix it would simply be replacing the binary.

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                There is already a thread for this. See https://forum.pfsense.org/index.php?topic=82163.msg449524#msg449524

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.