Menu
Two scenarios that would make OS X vulnerable to the Shellshock bug

Two scenarios that would make OS X vulnerable to the Shellshock bug

Intego has seen some proof-of-concept exploits for OS X using Bash

Apple's OS X is vulnerable to the Shellshock bug, but it's not that easy for attackers to take advantage of it, according to Intego, which specializes in security software for the operating system.

Shellshock is the nickname for a flaw in the Bourne Again Shell, or Bash, which is a command-line shell processor widely present in Unix and Linux systems. The flaw in Bash, which has been present for two decades, could allow an attacker to take complete control of a computer.

Apple, which plans to patch the flaw, said most users are fine unless they've tweaked advanced Unix settings. By adjusting those settings, Bash could be exposed to attackers, wrote Derek Erwin of Intego in a blog post. Intego has already seen proof-of-concept exploits for OS X, he wrote.

For example, Bash would be exposed if a user turned on the remote login capability for all users, including guests. But that is an action that "is probably not the most secure thing to do anyway," Erwin wrote, as it would open up the computer to other possible attacks.

Another scenario in which adjusted settings could make a difference is on a Lion OS X server running Apache or PHP scripting environments, Erwin wrote. If Apache is configured to run scripts, an attacker could insert variables into a script that a Bash shell would run.

"This one, however, requires exploiting two holes," he wrote. "First, in the script running on Apache, and then in turn using that compromised script to send something to the Bash shell."

Both scenarios, however, are "edge cases," he wrote, "and both routes probably require a level of technical expertise that the person configuring their account as such can patch the exploit fairly simply."

Computer security researchers are still trying to figure out the extent to which Internet-connected devices are vulnerable to Bash, as the software is so prevalent. Attackers have been scanning the Internet to find vulnerable systems, and experts are predicting that more specific attacks customized for vulnerable systems will emerge.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags securitymalwaredata breachExploits / vulnerabilitiesIntego

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments