A new security vulnerability known as the Bash or Shellshock bug could spell disaster for major digital companies, small-scale Web hosts and even Internet-connected devices.

The quarter-century-old security flaw allows malicious code execution within the bash shell (commonly accessed through Command Prompt on PC or Mac's Terminal application) to take over an operating system and access confidential information.

A post from open-source software company Red Hat warned that "it is common for a lot of programs to run Bash shell in the background," and the bug is "triggered" when extra code is added within the lines of Bash code.

Security expert Robert Graham has warned that the Bash bug is bigger than Heartbleed because "the bug interacts with other software in unexpected ways" and because an "enormous percentage" of software interacts with the shell.

"We'll never be able to catalogue all the software out there that is vulnerable to the Bash bug," Graham said. "While the known systems (like your Web server) are patched, unknown systems remain unpatched. We see that with the Heartbleed bug: six months later, hundreds of thousands of systems remain vulnerable."

Ars Technica reports that the vulnerability could affect Unix and Linux devices, as well as hardware running Max OS X. According to Ars, a test on Mac OS X Mavericks (version 10.9.4) showed that it has "a vulnerable version of Bash".

Graham warned that the Bash bug was also particularly dangerous for connected Internet-of-things devices because their software is built using Bash scripts, which are "less likely to be patched...[and] more likely to expose the vulnerability to the outside world". Similarly, Graham said the bug has existed for a "long, long time" meaning a great number of older devices will be vulnerable.

"The number of systems needing to be patched, but which won't be, is much larger than Heartbleed," he said.

The Heartbleed bug, the major security vulnerability revealed in April, was introduced into OpenSSL more than two years ago, allowing random bits of memory to be retrieved from impacted servers. Security researcher Bruce Schneier called the flaw "catastrophic".

"On the scale of 1 to 10, this is an 11," he said, estimating that half a million websites were vulnerable.


Patch & Fixes

We at Yeahhost has patched all our server operating systems thatusesbash commandto prevent exposure fromthe Shellshock bug security flaw.



Friday, September 26, 2014

« Back