BASH exposure expressed as bigger than Heartbleed<SOLUTIONS>

For discussions about security.
Message
Author
User avatar
8Geee
Posts: 2181
Joined: Mon 12 May 2008, 11:29
Location: N.E. USA

#181 Post by 8Geee »

Thats funny, mine fails to connect with "potentially vunerable handshake" supplied by the server. Using TLS1.1 or 1.2 protocol here.

BTW... I disabled/removed ssl V.C. 0.2 and editted about config to a 3 fallback 2 config. TLS1.0 not allowed. I did this because one could select ssl3.0 in the dropdown box in the preferences of the add-on. Very naughty.
Linux user #498913 "Some people need to reimagine their thinking."
"Zuckerberg: a large city inhabited by mentally challenged people."

User avatar
Griot
Posts: 131
Joined: Fri 12 Sep 2014, 18:10
Location: Serbia

#182 Post by Griot »

Thanx for the link, perdido. There is only one result marked as 'improvable' with Opera 12.16. It doesn't look like THE essential option to me. AFAIK SSL3 is disabled by default in said browser.
Session Ticket Support - Improvable
Session tickets are not supported in your client. Without them, services will have a harder time making your client's connections fast. Generally, clients with ephemeral key support get this for free.

rolf
Posts: 34
Joined: Sun 28 Dec 2008, 17:24

#183 Post by rolf »

perdido wrote:
This site tells you which SSL/TLS you are using.

https://www.howsmyssl.com/

.
It tells me
Bad Your client is using TLS 1.0
while SSL Version Control 0.2 is set to TLS 1.2

:?:

User avatar
perdido
Posts: 1528
Joined: Mon 09 Dec 2013, 16:29
Location: ¿Altair IV , Just north of Eeyore Junction.?

#184 Post by perdido »

rolf wrote:
perdido wrote:
This site tells you which SSL/TLS you are using.

https://www.howsmyssl.com/

.
It tells me
Bad Your client is using TLS 1.0
while SSL Version Control 0.2 is set to TLS 1.2

:?:
Mentioned on the SSL Version control download page is that FF34, FF33 reset to TLS1.0 on restart.
https://addons.mozilla.org/en-US/firefo ... l/reviews/

.

rolf
Posts: 34
Joined: Sun 28 Dec 2008, 17:24

#185 Post by rolf »

perdido wrote: Mentioned on the SSL Version control download page is that FF34, FF33 reset to TLS1.0 on restart.
https://addons.mozilla.org/en-US/firefo ... l/reviews/

.
I can set the Version Control preference in the dropdown to anything, restart Seamonkey, and the page at https://www.howsmyssl.com/ always tells me I'm running, TLS 1.0

I had security.tls.version.min;3 set in about:config. I can change that to anything from security.tls.version.min;1 to security.tls.version.min;4 and it makes no difference when Seamonkey is restarted.

Seamonkey 2.18 Linux x86_64

Thanks.

User avatar
Puppus Dogfellow
Posts: 1667
Joined: Tue 08 Jan 2013, 01:39
Location: nyc

#186 Post by Puppus Dogfellow »

Geoffrey wrote:Edit: updated to bash-4.3.30-1
mavrothal wrote:Do we know anything more about rg66's version? ie source and configure options?
The latest patch 28 seems to have fixed it, I'm pretty sure that rg66 used the same sources as I did and compiled with

Code: Select all

 ./configure --prefix=/ --with-curses
I compiled using

Code: Select all

./configure --with-curses --bindir=/bin --datarootdir=/usr/share

Code: Select all

bash --version
GNU bash, version 4.3.28(1)-release (i686-pc-linux-gnu)
Copyright (C) 2013 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>

This is free software; you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
# 
# curl --insecure https://shellshocker.net/shellshock_test.sh | bash
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2009  100  2009    0     0   1398      0  0:00:01  0:00:01 --:--:--  1520
CVE-2014-6271 (original shellshock): not vulnerable
bash: shellshocker: command not found
CVE-2014-6278 (Florian's patch): not vulnerable
CVE-2014-7169 (taviso bug): not vulnerable
CVE-2014-//// (exploit 3 on http://shellshocker.net/): not vulnerable
CVE-2014-7186 (redir_stack bug): not vulnerable
CVE-2014-7187 (nested loops off by one): not vulnerable
bash-4.3.30-1.pet

bash_DOC-4.3.30-1.pet

bash_NLS-4.3.30-1.pet
works in precise 5.5; no apparent frisbee problems.

thanks!

Post Reply