Menu
Two scenarios that would make OS X vulnerable to the Shellshock bug

Two scenarios that would make OS X vulnerable to the Shellshock bug

Intego has seen some proof-of-concept exploits for OS X using Bash

Apple's OS X is vulnerable to the Shellshock bug, but it's not that easy for attackers to take advantage of it, according to Intego, which specializes in security software for the operating system.

Shellshock is the nickname for a flaw in the Bourne Again Shell, or Bash, which is a command-line shell processor widely present in Unix and Linux systems. The flaw in Bash, which has been present for two decades, could allow an attacker to take complete control of a computer.

Apple, which plans to patch the flaw, said most users are fine unless they've tweaked advanced Unix settings. By adjusting those settings, Bash could be exposed to attackers, wrote Derek Erwin of Intego in a blog post. Intego has already seen proof-of-concept exploits for OS X, he wrote.

For example, Bash would be exposed if a user turned on the remote login capability for all users, including guests. But that is an action that "is probably not the most secure thing to do anyway," Erwin wrote, as it would open up the computer to other possible attacks.

Another scenario in which adjusted settings could make a difference is on a Lion OS X server running Apache or PHP scripting environments, Erwin wrote. If Apache is configured to run scripts, an attacker could insert variables into a script that a Bash shell would run.

"This one, however, requires exploiting two holes," he wrote. "First, in the script running on Apache, and then in turn using that compromised script to send something to the Bash shell."

Both scenarios, however, are "edge cases," he wrote, "and both routes probably require a level of technical expertise that the person configuring their account as such can patch the exploit fairly simply."

Computer security researchers are still trying to figure out the extent to which Internet-connected devices are vulnerable to Bash, as the software is so prevalent. Attackers have been scanning the Internet to find vulnerable systems, and experts are predicting that more specific attacks customized for vulnerable systems will emerge.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securitydata breachIntegoExploits / vulnerabilitiesmalware

Featured

Slideshows

Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
HP re-imagines education through Auckland event launch

HP re-imagines education through Auckland event launch

HP New Zealand held an inaugural Evolve Education event at Aotea Centre in Auckland, welcoming over 70 principals, teachers and education experts to explore ways of shaping and enhancing learning using technology.

HP re-imagines education through Auckland event launch
Show Comments