News Recap: An Update on the Shellshock Bug

By | October 9th, 2014|Uncategorized|

Shellshock BugOn September 24, 2014, the Shellshock bug was discovered, exposing vulnerabilities in Unix and Linux machines. The aftermath of the Shellshock bug has continued to stay in headlines as a wave of new vulnerabilities have emerged.

Threatpost’s Michael Mimoso explains that Shellshock has been actively exploited: “Analysis into the vulnerability and Bash behavior once it was patched gave birth to a half-dozen vulnerabilities in all, each with a different degree of severity.”For example, “Mayhem,” a type of malware that was discovered in April, is now using Shellshock as a way to infect servers.

“In the past, the malware used a PHP script to infect servers, but the latest version uploads a script in the Perl programming language via the Shellshock vulnerability,” said eWeek reporter Robert Lemos.

Some speculate that Shellshock may be worse than Heartbleed, but many experts believe that the worst of Shellshock is already behind us.

Tom’s Guide’s Marshall Honorof explains that the “bottom line is that while a very enterprising malefactor could use Shellshock’s tricks to affect a Windows system, system administrators can take prophylactic measures against it, and everyday users don’t have to worry about it. With fixes for the various affected Unix-like operating systems already being deployed as well, Shellshock’s potential impact should continue to diminish over time.”

Do you have any questions about Shellshock? Let us know on Twitter and Facebook, and be sure to check out our Tumblr for the latest industry news stories.

Customer Alert: ‘Shellshock’ Bug

By | September 26th, 2014|Uncategorized|

On September 24, 2014, Red Hat, Inc., the software company that provides a version of the Linux Operating System, indicated that its security team discovered a vulnerability in the command line interface functionality known as “Bash” (Bourne-Again Shell). This vulnerability, called “Shellshock,” is believed to pose a larger threat than the Heartbleed vulnerability that was discovered in April 2014. Shellshock poses a serious threat because cyber criminals could exploit the vulnerability and execute arbitrary code in order to gain control of servers. This exposure extends to any Unix and Linux machine via Web requests, CentOS machines, Mac computers, or any program that runs software with Bash functionality.

The recommended resolution for addressing the Shellshock vulnerability is to apply the latest patches, which have been specifically developed to address this issue, distributed by the Operating System (OS) vendors, e.g., Red Hat, Apple and others. Please note, however, that the current patch set is under development and may not provide complete protection from this vulnerability.

CSID customers should be assured that we have evaluated our systems for any exposure and patched our Linux servers in all environments, up to and including Production. We will continue to test and apply security patches to our servers as they become available from the OS vendors.

We strongly recommend that our customers take the same proactive approach with respect to any and all machines that potentially have the Bash Security Vulnerability.

For more information, please visit the Red Hat Security Blog.

Update: Apple has released updates to insulate Mac OS X systems from teh dangerous “Shellshock” bug. Patches are available from the following links for OS X Mavericks, Mountain Lion and Lion.


Load More Posts