🦞🌯 Lobster Roll

Thread

Shellshock (2014, 2025) (dwheeler.com)

Stories related to "Shellshock (2014, 2025)" across the full archive.

Shellshock (2014, 2025) (dwheeler.com)
qmail is a vector for CVE-2014-6271 (bash "shellshock") (marc.info)
A Historical Perspective of Speech Recognition (2014) (cacm.acm.org)
Why SSL was renamed to TLS in late 90s (2014) (tim.dierks.org)
Practical Security for 2014 (youtube.com)
Highlights of the Real World Cryptography 2014 workshop (blog.xot.nl)
This is a link to the summary of day #1, which has links to day #2 and day #3.
Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038) (openwall.com)
TrustyCon - Live from San Francisco 02/27/2014 (youtube.com)
Stream of the full conference https://www.trustycon.org. The last two speakers, starting at 6h06m were very good.
Deep Analysis of CVE-2014-0502 – A Double Free Story (blog.spiderlabs.com)
Heap Overflow in YAML URI Escape Parsing (CVE-2014-2525) (ruby-lang.org)
DigitalOcean Security Disclosure 2014-03-30: Not destroying droplets securely, data is completely recoverable (gist.github.com)
Heartbleed Bug (OpenSSL CVE-2014-0160) (heartbleed.com)
Test your server for Heartbleed (CVE-2014-0160) (filippo.io)
Oracle Critical Patch Update - April 2014 (oracle.com)
Rails Directory Traversal Vulnerability With Certain Route Configurations (CVE-2014-0130) (groups.google.com)
An earlier version of this advisory incorrectly assumed that the only way to trigger this vulnerability was with routes containing '\*action'. There are additional attack vectors and as a result *all* users are advised to upgrade to a fixed version as soon as possible.
BSDCan 2014: Bob Beck on LibreSSL: the first 30 days, and where we go from here (openbsd.org)
http://www.bsdcan.org/2014/schedule/events/520.en.html http://undeadly.org/cgi?action=article&sid=20140517144304
yescrypt - password hashing scalable beyond bcrypt and scrypt (PHDays 2014) (openwall.com)
OpenSSL Security Advisory [05 Jun 2014] (openssl.org)
Along with a pretty website for CVE-2014-0224 (CCS Injection Vulnerability): http://ccsinjection.lepidum.co.jp/ and a write-up about it by Adam Langley: https://www.imperialviolet.org/2014/06/05/earlyccs.html
pwn4fun Spring 2014 - Safari - Part I (googleprojectzero.blogspot.com)
Black Hat 2014 Talks (youtube.com)
The poisoned NUL byte, 2014 edition (googleprojectzero.blogspot.com)
CVE-2014-1564: Uninitialized memory with truncated images in Firefox (lcamtuf.blogspot.com)
CVE-2014-6271 And You: A Tale Of Nagios And The Bash Exploit (blog.threatstack.com)
Free Software Foundation statement on the GNU Bash "shellshock" vulnerability (fsf.org)
Almost tempted to include the satire tag.
How to Protect your Server Against the Shellshock Bash Vulnerability (digitalocean.com)
Bash bug: so, like, apply the unofficial patch now (CVE-2014-6277) (lcamtuf.blogspot.com)
Bash bug: the other two RCEs, or how we chipped away at the original fix (CVE-2014-6277 and '78) (lcamtuf.blogspot.com)
CVE-2014-7284 (NGRO Bug): Lack of randomness in Linux kernel network secrets (webcache.googleusercontent.com)
cmd.exe "shellshock" (twitter.com)
Per Dan Kaminsky, ‏"probably not exploitable but we'll see."
Protect Your Docker Containers Against Shellshock (blog.tutum.co)