kk Blog —— 通用基础


date [-d @int|str] [+%s|"+%F %T"]
netstat -ltunp
sar -n DEV 1

Bash软件安全漏洞检测及解决方案

http://www.techweb.com.cn/ucweb/news/id/2079505

redhat官方提供漏洞详情

A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.

redhat官方提供检测方式

运行命令:

1
  $ env x='() { :;}; echo vulnerable'  bash -c "echo this is a test"

如果返回以下内容:则请尽快升级。

1
2
 vulnerable
this is a test

http://seclists.org/oss-sec/2014/q3/650

The technical details of the vulnerability follow.

Bash supports exporting not just shell variables, but also shell functions to other bash instances, via the process environment to (indirect) child processes. Current bash versions use an environment variable named by the function name, and a function definition starting with “() {” in the variable value to propagate function definitions through the environment. The vulnerability occurs because bash does not stop after processing the function definition; it continues to parse and execute shell commands following the function definition. For example, an environment variable setting of

1
  VAR=() { ignored; }; /bin/id

will execute /bin/id when the environment is imported into the bash process. (The process is in a slightly undefined state at this point. The PATH variable may not have been set up yet, and bash could crash after executing /bin/id, but the damage has already happened at this point.)

The fact that an environment variable with an arbitrary name can be used as a carrier for a malicious function definition containing trailing commands makes this vulnerability particularly severe; it enables network-based exploitation.

So far, HTTP requests to CGI scripts have been identified as the major attack vector.

A typical HTTP request looks like this:

1
2
3
GET /path?query-param-name=query-param-value HTTP/1.1  
Host: www.example.com  
Custom: custom-header-value  

The CGI specification maps all parts to environment variables. With Apache httpd, the magic string “() {” can appear in these places:

  • Host (“www.example.com”, as REMOTE_HOST)
  • Header value (“custom-header-value”, as HTTP_CUSTOM in this example)
  • Server protocol (“HTTP/1.1”, as SERVER_PROTOCOL)

The user name embedded in an Authorization header could be a vector as well, but the corresponding REMOTE_USER variable is only set if the user name corresponds to a known account according to the authentication configuration, and a configuration which accepts the magic string appears somewhat unlikely.

In addition, with other CGI implementations, the request method (“GET”), path (“/path”) and query string (“query-param-name=query-param-value”) may be vectors, and it is conceivable for “query-param-value” as well, and perhaps even “query-param-name”.

The other vector is OpenSSH, either through AcceptEnv variables, TERM or SSH_ORIGINAL_COMMAND.

Other vectors involving different environment variable set by additional programs are expected.

通用寄存器编码表

  • 来源:systemtap-2.4/runtime/loc2c-runtime.h

    x86_64

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
#define pt_dwarf_register_0(regs)       regs->rax
#define pt_dwarf_register_1(regs)       regs->rdx
#define pt_dwarf_register_2(regs)       regs->rcx
#define pt_dwarf_register_3(regs)       regs->rbx
#define pt_dwarf_register_4(regs)       regs->rsi
#define pt_dwarf_register_5(regs)       regs->rdi
#define pt_dwarf_register_6(regs)       regs->rbp
#define pt_dwarf_register_7(regs)       regs->rsp
#define pt_dwarf_register_8(regs)       regs->r8
#define pt_dwarf_register_9(regs)       regs->r9
#define pt_dwarf_register_10(regs)      regs->r10
#define pt_dwarf_register_11(regs)      regs->r11
#define pt_dwarf_register_12(regs)      regs->r12
#define pt_dwarf_register_13(regs)      regs->r13
#define pt_dwarf_register_14(regs)      regs->r14
#define pt_dwarf_register_15(regs)      regs->r15

i386

1
2
3
4
5
6
7
8
#define pt_dwarf_register_0(regs)       regs->eax
#define pt_dwarf_register_1(regs)       regs->ecx
#define pt_dwarf_register_2(regs)       regs->edx
#define pt_dwarf_register_3(regs)       regs->ebx
#define pt_dwarf_register_4(regs)       (user_mode(regs) ? regs->esp : (long)®s->esp)
#define pt_dwarf_register_5(regs)       regs->ebp
#define pt_dwarf_register_6(regs)       regs->esi
#define pt_dwarf_register_7(regs)       regs->edi
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
寄存器编码    8    16    32    64
000    al    ax    eax    rax
001    dl    dx    edx    rdx
010    cl    cx    ecx    rcx
011    bl    bx    ebx    rbx
100    ?    si    esi    rsi
101    ?    di    edi    rdi
110    ?    bp    ebp    rbp
111    ?    sp    esp    rsp
1000    r8b    r8w    r8d    r8
1001    r9b    r9w    r9d    r9
1010    r10b    r10w    r10d    r10
1011    r11b    r11w    r11d    r11
1100    r12b    r12w    r12d    r12
1101    r13b    r13w    r13d    r13
1110    r14b    r14w    r14d    r14
1111    r15b    r15w    r15d    r15

1.5倍空间归并排序--Knuth

divide-and-conquer algorithm, in the style suggested by Knuth volume 3 (2nd edition),

1
2
3
4
5
6
7
8
   |-------------I-------------|-------------|

         p1            p2            ex

p1+p2原数组,p1前半部分,p2后半部分,ex额外空间
1、将p2用ex额外空间排到p2
2、将p1排到ex
3、将p2、ex合并到原数组