Analysts: Shellshock Bug Causes Chaos and Mayhem

Shellshock is certainly living up to its name. Security analysts continue to weigh in on the severity but are now pointing toward solutions. Also known as the Bash (Bourne-Again Shell) bug, most security researchers believe itEUs bigger than Heartbleed, which affected two-thirds of the Internet.

Clearly, the bug is easy to exploit and the number of vulnerable programs are far more vast than Heartbleed, which has gone down in security history as one of the worst bugs ever. But we may not have seen anything yet. Brandon Edwards, Vice President of SilverSky Labs at cloud security firm SilverSky, told us to expect EUchaos and mayhem" as the bad guys now rush to take advantage of Bash before it is patched.

EUMajor breaches are likely in progress as we speak. So what does it mean?EU Edwards asked. EUThis vulnerability will likely continue to live on in unexpected places where no one has realized Bash is present, or which have no easy mechanism for patching. The Bash bug lets attackers directly execute commands/code and take control of the system, and exploitation is universal and incomprehensibly easy.EU

Is Patching the Only Answer?

Users must patch, said Flavio De Cristofaro, Vice President of Engineering for Professional Products at network security firm Core Security. He told us some folks are recommending that users check whether or not they are running CGI (Common Gateway Interface) scripts -- but that is absolutely not enough.

EUC++, Python, PHP and every other application that makes Bash calls are affected,EU he said. EUOther applications supporting DHCP, SSH -- restricted shell -- may be also affected, not only from a remote attack but also from a local privilege escalation perspective.EU

De CristofaroEUs advice: patch, patch and patch. Patches are already available for most well-known systems, he said, or they will be available very soon.


Comments are closed.