Shellshock – Bash Vulnerability

Shellshock is a serious security vulnerability in Bourne-Again SHell (BASH) on Linux.

Known as the “Bash Bug” or “ShellShock”, the GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271) could allow an attacker to gain control over a targeted computer if exploited successfully.

First disclosed on 24 September 2014, the vulnerability potentially affects most versions of Linux and Unix operating systems, in addition to Mac OS X (which is based around Unix).

Within an hour of the announcement of the Bash vulnerability, there were reports of machines being compromised by the bug. By 25 September 2014, botnets based on computers compromised with exploits based on the bug were being used by attackers for distributed denial-of-service (DDoS) attacks and vulnerability scanning.

On 26 September 2014, a Shellshock-related botnet was being used for a DDoS attack against Akamai Technologies and to scan the United States Department of Defense.

By 30 September, the website performance firm CloudFlare said it was tracking approximately 1.5 million attacks and probes per day related to the bug.

The vulnerability affects Bash, a common component known as a shell, that appears in many versions of Linux and Unix. Bash acts as a command language interpreter. In other words, it allows the user to type commands into a simple text-based window, which the operating system will then run.

Bash can also be used to run commands passed to it by applications and it is this feature that the vulnerability affects. One type of command that can be sent to Bash allows environment variables to be set.

According to RedHat, “An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.”

Environment variables are dynamic, named values that affect the way processes are run on a computer. The vulnerability lies in the fact that an attacker can tack-on malicious code to the environment variable, which will run once the variable is received.

Read more items related to security.

Discovered on 12 September 2014, analysis of the source code history of Bash shows the vulnerabilities had existed since version 1.03 of Bash released in September 1989. The developers (and current maintainers) of BASH were immediately notified by the discoverer, in order to allow time to develop and test a security patch.

There was an original fix published for CVE-2014-6271, but within days, a second advisory was issued (CVE-2014-7169) to address further risks. Intense scrutiny of the underlying design flaws discovered a variety of related vulnerabilities, (CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187); which maintainer Chet Ramey addressed with a series of further patches.

Some Digital Tsunami client sites are hosted on our own, or client-exclusive, private clouds on Linux-based platforms. These clouds had the potential to be exposed to this vulnerability.

However, within hours of the official announcement of the vulnerability, the security patch was applied to all Digital Tsunami Linux web servers. Sites hosted on the Windows platform are not subject to the vulnerability.

No Digital Tsunami clients on our private clouds were affected by the recent Heartbleed vulnerability.

Sites hosted on external servers will remain at risk until security patches are applied.

For enquiries on advanced security for your web presence, please contact Digital Tsunami Sales or Technical Support.

 

External References:
Oracle
Red Hat Security Advisory on CVE-2014-7169
Shellshocker
Symantec
Ubuntu Security FAQ
US Computer Emergency Readiness Team

From Our Clients

Quotation Mark

I recently engaged Digital Tsunami to design and build my 60-page website. I'm a website copywriter who relies heavily on web-generated business, so my own online presence needs to be impeccable.

The solution that Digital Tsunami supplied is brilliant. It meets my needs perfectly; it's clean, bold, elegant, fast, and easy to edit. I've had lots of very positive feedback about it, and since launch, my request for quote rate and conversion rate have increased markedly.

The team at Digital Tsunami was incredibly responsive, delivering a solution well ahead of deadline. Their technical knowledge was exceptional, they were innovative, and they were very meticulous. What's more, they understood my business and technical requirements and translated them into a user-friendly, refined, professional site which is conceptually simple and cohesive.

I have no hesitation in recommending the website design services of Digital Tsunami to any business .. that needs a stand-out online presence.

Glenn Murray
copywriter
Sydney, NSW, Australia
Quotation Mark

Andrew was able to create an entirely new website in a short period of time and to budget. He and his team worked very well with both our Marketing and IT team.

Steve Mannion
General Manager, Sales & Marketing
Silverwater, NSW, Australia
Quotation Mark

Central to the development process is Digital Tsunami’s thorough understanding of the project needs, clear and constant communication, and creative, innovative and meticulous approach to delivering solutions.

Sharon Don
General Manager, Products and Services
Sydney, NSW, Australia
Personal Broadband Australia
Quotation Mark

Andrew and his team at Digital Tsunami were the developers behind our micro site for Fearless.

I like the way they work (efficient, effective) and delivered a great site, on time.

Suzy Jacobs
Founder & Chief Inspiration Officer
Sydney, NSW, Australia
She Business
Quotation Mark

.. a reliable and steadfast operator, with a keen sense of service. Innovative and contemporary, and operating within the upper echelon.

Matthew Gormly
Director
Mönsterås, Sweden
error: We appreciate that you value our content. You are welcome to link to this page, but content is copyright protected.