{"id":79233,"date":"2014-10-01T14:11:16","date_gmt":"2014-10-01T08:41:16","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=79233"},"modified":"2014-10-01T14:11:16","modified_gmt":"2014-10-01T08:41:16","slug":"shellshock-bug-care","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/shellshock-bug-care\/","title":{"rendered":"Shellshock Bug \u2013 How Does it Impact You?"},"content":{"rendered":"<p>A new security bug has been discovered recently, and it is as big, if not bigger, than the <a href=\"https:\/\/blogs.quickheal.com\/3-important-things-you-should-know-about-heartbleed\/\">Heartbleed<\/a> bug from a few months back. This security bug is called \u2018Shellshock\u2019 and it is found in a common program that runs on UNIX and Linux operating systems. The scope of this bug is pretty huge and now that attackers are aware of this, it could lead to severe security risks for many users. Not since Heartbleed have we seen such a security bug operate on such a large scale. <\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/10\/bash-shellshock.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/10\/bash-shellshock.jpg\" alt=\"bash-shellshock\" width=\"700\" height=\"432\" class=\"aligncenter size-full wp-image-79240\" \/><\/a><\/p>\n<p><b>What is Shellshock all about?<\/b><\/p>\n<p>Shellshock is a security vulnerability found in Bash. Bash is a command shell that is commonly used on Linux and UNIX operating systems and it has been around since 1989. Alarmingly, Shellshock has been around for more than 20 years now and it is yet unknown if it was accidentally developed by the creator. Just like Heartbleed, Shellshock seems to have been around for a long time and has been missed by several security audits. <\/p>\n<p><b>What is Bash and how does Shellshock work within it?<\/b><\/p>\n<p>Shellshock is what is commonly termed as a Remote Code Execution (RCE) vulnerability within Bash. Just like we have the Command Prompt on Windows, Linux and UNIX have the command shell known as Bash. It helps the user run other programs within the system and Bash stands for \u201cBourne Again Shell\u201d.<\/p>\n<p>Using the Shellshock vulnerability, an attacker can affect machines using a technique known as command injection. Via this method, he can run a program on Bash without intimating the user and without logging on to the computer himself. Since Bash runs several programs in the background, all the attacker needs to do is ensure that his malicious text is not spotted. Harmless looking data contains malicious code that gets executed in this scenario. <\/p>\n<p><b>Who is vulnerable to Shellshock?<\/b><\/p>\n<p>Bash is commonly used in Apple\u2019s OS X operating system. Additionally, it is also present in several web-servers and home appliances such as routers and other devices which face the Internet. This causes further trouble as updates for these devices are not easy to acquire or implement. As a result, Shellshock could potentially disrupt several services and homes. <\/p>\n<p>With Heartbleed, an attacker could only steal data stored in the memory of systems. However, with Shellshock, he can gain complete access of the system. Hence the potential risk here is far greater. <\/p>\n<p><b>Are Microsoft Windows users also vulnerable to Shellshock?<\/b><\/p>\n<p>As of now, users of Apple Macs, Linux and UNIX based machines are vulnerable to Shellshock and the Bash vulnerability. Windows users are not directly vulnerable to the same. However, attackers are working on ways to utilize this weakness against Windows users as well. So it is highly recommended that Windows users keep their OS and security software completely updated at all times. <\/p>\n<p><b>So what is the solution for Shellshock?<\/b> <\/p>\n<p>There are several programs and techniques that prevent command injection. However, the problem is that no one really knows what commands to look for as attackers can mask it well. Placing a few words of malicious code within thousands of lines is very easy, and pinpointing it is like finding a needle in a haystack. <\/p>\n<p>The best solution here is for Bash to be updated by the people who use it. If there are any other vendor-specific updates available, they should be initiated as well. <\/p>\n<p><b>UPDATE:<\/b> It has been known that Macs use Bash as their default command shell. Hence they were at high risk. Apple has now pushed out updates that solve the Bash vulnerability in their systems. This update should be installed immediately from the following links: <\/p>\n<p><a href=\"https:\/\/support.apple.com\/kb\/DL1767\"><b>OS X Lion<\/b><\/a><br \/>\n<a href=\"https:\/\/support.apple.com\/kb\/DL1768\"><b>OS X Mountain Lion<\/b><\/a><br \/>\n<a href=\"https:\/\/support.apple.com\/kb\/DL1769\"><b>OS X Mavericks<\/b><\/a><\/p>\n<p>Moreover, we also recommend that Mac users install <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security-for-mac\">Quick Heal Total Security for Mac<\/a> and keep this product updated for latest patches to guard against Shellshock. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new security bug has been discovered recently, and it is as big, if not bigger, than the Heartbleed bug from a few months back. This security bug is called \u2018Shellshock\u2019 and it is found in a common program that runs on UNIX and Linux operating systems. The scope of this bug is pretty huge [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":79235,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[1051,1052,935,1053,611,1054,1055],"class_list":["post-79233","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-bash","tag-command-shell","tag-heartbleed","tag-linux","tag-mac","tag-shellshock","tag-unix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/79233"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=79233"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/79233\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=79233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=79233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=79233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}