New ‘Bash’ flaw could cripple computer networks

Status
Not open for further replies.

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,150
A SECURITY hole in Unix software code poses an enormous threat to everything from computers to sewerage treatment plants, pump networks, to web servers, traffic lights, airport lights, SCADA systems and even Apple Mac computers.
That’s because the hole has been found in a piece of code that’s fundamental to the running of machines across the internet, along with network infrastructure such as routers, switches, and phone exchanges.

It affects systems that operate Linux, Apple’s OS X operating system, and others, and in its worst case scenario, it opens the door for hackers to obtain access to computers and other systems through a web browser. From there they can infiltrate and play havoc with machines as well as the corporate computer networks they are part of.

Australia’s Computer Emergency Response Team said the code vulnerability was possibly the result of human error — a programming mistake. AusCERT information security analyst Marco Ostini said that since its discovery, hackers had been active in exchanging code in chat rooms and on Twitter. “It’s the sort of thing people could do without understanding the technicalities involved,” he said.

Mr Ostini said that because the flaw was part of the building blocks of the internet, the threat was even bigger than that posed by the Heartbleed security hole exposed in April. US company Red Hat, which specialises in providing open-source software to enterprises, logged it on September 14. It was discovered by Stephane Chazelas of internet content delivery giant Akamai. Mr Ostini said that under responsible disclosure practices, the bug’s existence was not reported publicly until today, along with many of the code fixes needed to nullify it.

But to his knowledge Apple has yet to release an update for its OS X operating system which was also affected by the security breach. Apple at this stage is not commenting. It has a policy of investigating security breaches and preparing a patch before making any public comment. Mr Ostini said the bug also could possibly affect iOS — the operating system used with the iPhone and iPad, and also possibly Windows, but this was less likely. “Code vulnerabilities are a dime a dozen, but this particular vulnerability is easy to exploit,” he said. Sources have told The Australian that FreeBSD, Oracle’s Solaris unix system, HP’s implementation of Unix HP-UX, Amazon Web Services, and Android are among others that are also yet to be patched.

Mr Ostini said hackers could exploit the security hole by using CGI (Common Gateway Interface) web script which is used to display web pages. Computer and mobile users which accessed these sites could give hackers the ability not only to control their machines but also to access the networks they are connected to. “The web script could take over the machine and give them access to everything,” he said. He said the bug was similar to a weakness exposed in Unix about 30 years ago.

Mr Ostini said he was not aware of reports of anyone successfully exploiting the vulnerability, but he said there was “lots of chatter” in various parts of the internet about it, along with guides on how to exploit it, including code to cut and paste and try out. Companies such as Red Hat, Ubuntu and Akamai had issued interim patches which, while not perfect, were sufficient to address the vulnerability, he said.

Kaspersky Lab chief executive Eugene Kasperksy said the internet should expect a lot of exploits and hacked websites to be disclosed in coming weeks. “The CVE-2014-6271 #bash patch doesn’t cover the full scope of the issue. Consider the current patch frenzy a trial run,” he said on Twitter.
 
  • Like
Reactions: Terry Ganzi and Ink

Nico@FMA

Level 27
Verified
May 11, 2013
1,687
While this flaw is new, the implications have been known for sometime now as mysterious hacks upon French and German companies bare the signature of this particular flaw. Yet None knew exactly how.
Ill guess now they know.
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
Hackers exploit 'Shellshock' bug with worms in early attacks
Hackers have begun exploiting the newly identified "Shellshock" computer bug, using fast-moving worm viruses to scan for vulnerable systems and then infect them, researchers warned on Thursday.

"Shellshock" is the first major Internet threat to emerge since the discovery in April of "Heartbleed," which affected OpenSSL encryption software that is used in about two-thirds of all web servers, along with hundreds of technology products for consumers and businesses.

The latest bug has been compared to "Heartbleed" partly because the software at the heart of the "Shellshock" bug, known as Bash, is also widely used in web servers and other types of computer equipment.

Read more at Reuters: http://www.reuters.com/article/2014/09/25/us-cybersecurity-shellshock-idUSKCN0HK23Y20140925
 
  • Like
Reactions: cruelsister

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,150
What took them so long?
 
I

illumination

Good question^^ Although most have patched this already.

For those running Ubuntu there is a simple test to make sure.


A simple test to check if your Bash is vulnerable is available publicly.

  • $ env var='() { ignore this;}; echo vulnerable' bash -c /bin/true

Upon running the above command, an affected version of bash will output "vulnerable".

Once the patch has been applied, the same test will return the following result.

  • bash: warning: var: ignoring function definition attempt
  • bash: error importing function definition for 'var'
 
  • Like
Reactions: avast! Protection

jogs

Level 22
Verified
Top Poster
Well-known
Nov 19, 2012
1,113
This lock and key game is a continuous process. One flaw is discovered and patched, then another one is discovered and patched and the process goes on forever. We humans are not perfect beings, so there is no way that we can make a perfect piece of software. As security experts get more experienced and build more strong security product , the hackers and crackers also gain more knowledge and are able to break the security. The only key factor here is who discovers the flaws first, if its a researcher then flaw is patched and if some one with evil intention discovers it then, it becomes a mater of real concern.
 
  • Like
Reactions: Moose
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top