TechCentralTechCentral
    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Dimension Data to be renamed NTT Data

      27 October 2023

      DStv makes RWC final stream available for R19.95

      27 October 2023

      Karpowership gets green light for Richards Bay plant

      27 October 2023

      Why people wave on Zoom

      27 October 2023

      Microsoft gaining ground in cloud race with AWS, Google

      27 October 2023
    • World

      Intel beats expectations; manufacturing momentum builds

      27 October 2023

      Google CEO to testify on Monday in antitrust trial

      27 October 2023

      Huawei sees growth in cloud, digital power segments

      27 October 2023

      China rushes to swap Western tech for domestic options

      26 October 2023

      Alphabet, Meta deliver solid financial performances

      26 October 2023
    • In-depth

      Quantum computers in 2023: what they do and where they’re heading

      22 October 2023

      How did Stephen van Coller really do as EOH CEO?

      19 October 2023

      Risc-V emerges as new front in US-China tech war

      6 October 2023

      Get ready for a tidal wave of software M&A

      26 September 2023

      Watch | A tour of Vumatel’s Alexandra fibre roll-out

      19 September 2023
    • TCS

      TCS | Mesh.trade’s Connie Bloem on the future of finance

      26 October 2023

      TCS | Rahul Jain on Peach Payments’ big funding round

      23 October 2023

      TCS+ | How MiWay uses conversation analytics

      16 October 2023

      TCS+ | The story behind MTN SuperFlex

      13 October 2023

      TCS | The Information Regulator bares its teeth – an interview with Pansy Tlakula

      6 October 2023
    • Opinion

      Big banks, take note: PayShap should be free

      20 October 2023

      Eskom rolling out virtual wheeling – here’s how it works

      4 October 2023

      How blockchain can help defeat the scourge of counterfeit goods

      29 September 2023

      There’s more to the skills crisis than emigration

      29 September 2023

      The role of banks in Africa’s digital future

      22 August 2023
    • Company Hubs
      • 4IRI
      • Africa Data Centres
      • Altron Document Solutions
      • Altron Systems Integration
      • Arctic Wolf
      • AvertITD
      • CoCre8
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • E4
      • Entelect
      • ESET
      • Euphoria Telecom
      • iKhokha
      • Incredible Business
      • iONLINE
      • LSD Open
      • Maxtec
      • MiRO
      • NEC XON
      • Next DLP
      • Ricoh
      • Skybox Security
      • SkyWire
      • Velocity Group
      • Videri Digital
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • E-commerce
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Metaverse and gaming
      • Motoring and transport
      • Open-source software
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Top » Shellshock bug: what you need to know

    Shellshock bug: what you need to know

    By The Conversation26 September 2014
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    binbash-640

    A first and quite reasonable thought readers may have will be to wonder: what is bash?

    When you use a computer you probably interact with it through a point-and-click, visual interface such as Windows or Mac OS. More advanced users or specific tasks might require a text-only interface, using typed commands. This command-line program is known as a shell, and bash is the acronym for Bourne Again SHell (a successor to the Bourne shell, written by Stephen Bourne – that’s geek humour right there), known to everyone as bash.

    So, what you need to know is that a shell is essential, and that bash as the most common shell in use is installed on pretty much every machine that runs a flavour of Linux or Unix. That includes Mac OS X – which, behind its shiny desktop, is a Unix-based operating system, too.

    What has systems administrators hot under the collar right now is the discovery by Red Hat, a firm that produces one of the long-established distributions of Linux favoured by enterprise, of a vulnerability in bash. This bug, which is being called “shellshock”, allows under specific conditions a hacker to remotely access and take control of a system running a vulnerable version of bash.

    Potentially vulnerable computers running Linux/Unix account for around two-thirds of Web servers. That will include a huge number of online services you use — shops, banks, social networking sites, government services. The police and military, too.

    Now you can see why everyone is panicking and claiming that this is bigger than the Heartbleed bug, a problem that only affected one specific technology (secure socket layers), which is not near-universal like bash. It has been classed as a maximum risk factor 10 of 10.

    Red Hat has released a patch to close the loophole and solve the problem, but it’s not perfect and still allows an attacker other vectors to exploit. Other Linux and Unix vendors will be on the case as a matter of urgency and no doubt there will be an update from Apple for its Mac OS systems very soon. It isn’t the fault of one organisation — there is no cause to bash Apple this time.

    This vulnerability, dating back to version 1.13 of the program, has existed for 22 years and it has taken detailed analysis by security experts to find it. Now it has been made public, vendors and system administrators are scrambling to close the hole while hackers and cyber criminals are trying to exploit it.

    In fact, within 24 hours of being announced, exploits are already being reported in the wild. The issue is exacerbated by the problem that shell programs such as bash are designed to be connected to remotely, through programs such as SSH or telnet. It isn’t too difficult to send commands to a remote device or to encourage users to download an application that uses the same commands.

    But that assumes the attacker is able to bypass your perimeter protection such as a firewall and other network security policies. As a network engineer, I know that while there is a weakness on my system that must be resolved, there are other defence mechanisms already surrounding that weakness that still provide protection.

    However, those running a Web server — whose entire function is to respond to those remote calls (in this case, your Web browser’s requests for pages on the site you’re browsing) — have much more of a problem. This provides a route into the system that can’t be blocked with a firewall as it would also block legitimate requests for the Web server. Systems administrators are probably very busy trying to ensure that their bash environments cannot be exploited.

    Also of concern are the tens of millions of pieces of networking hardware such as routers and switches that connect the Internet’s computers together. Almost all run stripped-down versions of Linux-like operating systems optimised for networking, but they also include bash for network engineers to connect and control them. These will need to be patched, too.

    Desktop users are safe(r)
    The rest of us can probably breathe easier. Attackers are more interested in compromising systems that may return financial advantage, which is unlikely to be our desktop computers.

    My advice to Apple Mac users is to check firewall settings and take care when downloading any third-party application not available via the App Store. For Linux users the same applies — Ubuntu has a software centre, for example, where the community has checked all available applications to date. In any case, a patch will be available soon. Windows users are unaffected (and it’s not often you can say that).

    Some are suggesting this bug is a larger problem for Apple desktop devices than it really is. Unless your machine has been set up to allow others remote access to it (it wouldn’t do so by default), has also switched off the firewall and is not using a protected network (home broadband routers provide their own protection, for example), then I wouldn’t worry. But install whatever recommended updates appear in the days to come.The Conversation

    • Andrew Smith is lecturer in networking at the Open University
    • This article was originally published on The Conversation
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleExecutive departures a big blow for Eskom
    Next Article Zuma took control of nuclear deal: report

    Related Posts

    Intel beats expectations; manufacturing momentum builds

    27 October 2023

    Google CEO to testify on Monday in antitrust trial

    27 October 2023

    Huawei sees growth in cloud, digital power segments

    27 October 2023
    Promoted

    Acsa aims for carbon neutrality by 2050

    27 October 2023

    iKhokha, Shopstar pave the way for simpler e-commerce

    27 October 2023

    Flutter vs React Native: a comprehensive comparison

    27 October 2023
    Opinion

    Big banks, take note: PayShap should be free

    20 October 2023

    Eskom rolling out virtual wheeling – here’s how it works

    4 October 2023

    How blockchain can help defeat the scourge of counterfeit goods

    29 September 2023

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2023 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.