SlideShare a Scribd company logo
Bash software bug could be bigger threat than Heartbleed, experts warn
Newly discovered bug is rated high for severity and low for complexity, meaning it may be easy
for hackers to exploit
Reuters in Boston
theguardian.com, Wednesday 24 September 2014 22.13 EDT
Jump to comments (0)
a young computer expert studying at an internet security training centre Computer users have
been warned of a new threat to data security. Photograph: Jung Yeon-je/AFP/Getty Images
A newly discovered security bug in a widely used piece of Linux software, known as Bash, could
pose a bigger threat to computer users than the Heartbleed bug that surfaced in April, cyber
experts have warned.
Bash is the software used to control the command prompt on many Unix computers. Hackers
could exploit a bug in Bash to take complete control of a targeted system, security experts said.
The Department of Homeland Security’s United States Computer Emergency Readiness Team, or
US-CERT, issued an alert saying the vulnerability affected Unix-based operating systems
including Linux and Apple’s Mac OS X.
Heartbleed allowed hackers to spy on computers but not take control of them, according to Dan
Guido, chief executive of the cybersecurity firm Trail of Bits.
“The method of exploiting this issue is also far simpler. You can just cut and paste a line of code
and get good results,” he said.
Tod Beardsley, an engineering manager at cybersecurity firm Rapid7, warned the bug was rated
a “10” for severity, meaning it has maximum impact, and rated “low” for complexity of
exploitation, meaning it is relatively easy for hackers to launch attacks.
“Using this vulnerability, attackers can potentially take over the operating system, access
confidential information, make changes etc,” Beardsley said. “Anybody with systems using Bash
needs to deploy the patch immediately.”
US-CERT advised computer users to obtain operating systems updates from software makers. It
said Linux providers including Red Hat had already prepared them, but it did not mention an
update for OS X. Apple representatives could not be reached.
Tavis Ormandy, a Google security researcher, said via Twitter that the patches seemed
“incomplete”. Ormandy could not be reached to elaborate, but several security experts said a
brief technical comment provided on Twitter raised concerns.
“That means some systems could be exploited even though they are patched,” said Chris
Wysopal, chief technology officer with the security software maker Veracode.
He said corporate security teams had spent Wednesday combing their networks to find
vulnerable machines and patch them, and they would probably be taking other precautions to
mitigate the potential for attacks in case the patches proved ineffective.
“Everybody is scrambling to patch all of their internet-facing Linux machines. That is what we did
at Veracode today,” he said. “It could take a long time to get that done for very large
organisations with complex networks.”
Heartbleed, discovered in April, is a bug in an open-source encryption software called OpenSSL.
The bug put the data of millions of people at risk as OpenSSL is used in about two-thirds of all
websites. It also forced dozens of technology companies to issue security patches for hundreds
of products that use OpenSSL.
Bash is a shell, or command prompt software, produced by the non-profit Free Software
Foundation. Officials with that group could not be reached for comment.

More Related Content

DOCX
Taylor 1
PPTX
Anti virus slide show presentation
DOCX
Chap 2 lab2 (Ej
PPTX
Equifax Breach Postmortem
PPT
Sandbox Technology in AntiVirus
PDF
Identifying, Monitoring, and Reporting Malware
DOCX
Mjtanasas1
PPTX
Industrial Cyber Security - EVF 2019 Alexandre Darcherif
Taylor 1
Anti virus slide show presentation
Chap 2 lab2 (Ej
Equifax Breach Postmortem
Sandbox Technology in AntiVirus
Identifying, Monitoring, and Reporting Malware
Mjtanasas1
Industrial Cyber Security - EVF 2019 Alexandre Darcherif

What's hot (20)

DOCX
R esearch report with footnote
PDF
OS-Anatomy-Article
PPTX
Securing Systems - Still Crazy After All These Years
PDF
Chapter 1, Transformasi antivirus
PPTX
Intro to Malware Analysis
PPTX
2018 Year in Review- ICS Threat Activity Groups
PDF
Beyond layers and peripheral antivirus security
DOCX
Chap 2 lab2 (Ej Guevarra)
DOCX
Kent philip neri (lab 2)
PDF
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
PDF
CSS Trivia
PPTX
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
PDF
CSIRS ICS BCS 2.2
PPTX
NDIA 2021 - solar winds overview and takeaways
PPTX
Secure Data Workflow
DOCX
Dungogan chap 2 lab 2
DOCX
Zamayla chap 2 lab 2
DOCX
Cataluña antivirus program
DOCX
Hamilton lara 2011
DOCX
Cataluña antivirus programs paper
R esearch report with footnote
OS-Anatomy-Article
Securing Systems - Still Crazy After All These Years
Chapter 1, Transformasi antivirus
Intro to Malware Analysis
2018 Year in Review- ICS Threat Activity Groups
Beyond layers and peripheral antivirus security
Chap 2 lab2 (Ej Guevarra)
Kent philip neri (lab 2)
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
CSS Trivia
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
CSIRS ICS BCS 2.2
NDIA 2021 - solar winds overview and takeaways
Secure Data Workflow
Dungogan chap 2 lab 2
Zamayla chap 2 lab 2
Cataluña antivirus program
Hamilton lara 2011
Cataluña antivirus programs paper
Ad

Similar to Bash software bug could be bigger threat than heartbleed, experts warn (20)

DOCX
The Bash Bug explained !
PDF
Was the cloud shell shocked
PDF
Shellshock - A Software Bug
PPTX
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
PPT
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
DOCX
Article on shellshock
ODP
Security, Hack1ng and Hardening on Linux - an Overview
PDF
Qubes os presentation_to_clug_20150727
PPTX
Industry reactions to wanna cry ransomware attacks
PPTX
DevOOPS: Attacks and Defenses for DevOps Toolchains
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PPTX
Shell Shock (Bash Bug)
PDF
We explain the security flaw that's freaking out the internet
PDF
Overkill Security. Digest. 2024-05. Level#Pro.pdf
PDF
Heartbleed 2017. 3 years later, still bleeding
PDF
How to exploit heartbleed vulnerability demonstration
PDF
Kernel Recipes 2019 - Kernel hacking behind closed doors
PDF
ShellShock (Software BASH Bug)
PDF
Bash Code-Injection Briefing
The Bash Bug explained !
Was the cloud shell shocked
Shellshock - A Software Bug
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Article on shellshock
Security, Hack1ng and Hardening on Linux - an Overview
Qubes os presentation_to_clug_20150727
Industry reactions to wanna cry ransomware attacks
DevOOPS: Attacks and Defenses for DevOps Toolchains
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Shell Shock (Bash Bug)
We explain the security flaw that's freaking out the internet
Overkill Security. Digest. 2024-05. Level#Pro.pdf
Heartbleed 2017. 3 years later, still bleeding
How to exploit heartbleed vulnerability demonstration
Kernel Recipes 2019 - Kernel hacking behind closed doors
ShellShock (Software BASH Bug)
Bash Code-Injection Briefing
Ad

More from Michael Holt (14)

RTF
NSA, GCHQ, Five, Nine and Fourteen Eyes White Paper on Cybersecurity Exploit ...
RTF
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
RTF
Icreach — nsa's secret google like search engine for metadata analysis
DOCX
Google never killed authorship entirely, some of the code still remains being...
RTF
Federal CyberSecurity Whistleblower on Analytics trackers and Backdoor Access
DOCX
Veterans Administration Hacked by foreign orgs, security needs standardization
DOC
Letter of Recommendation - Holt(1)
PDF
Merit Systems Protection Board Docket Number SF-0752-11-0427-I-1
PDF
Ron Wyden
DOCX
A flaw in Microsoft's Internet Explorer
DOCX
NSA's Secret Google-Like Search Engine for Metadata Analysis
DOCX
Beacons
RTF
Analytics Trackers
RTF
Andrzejewski, Barbara
NSA, GCHQ, Five, Nine and Fourteen Eyes White Paper on Cybersecurity Exploit ...
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
Icreach — nsa's secret google like search engine for metadata analysis
Google never killed authorship entirely, some of the code still remains being...
Federal CyberSecurity Whistleblower on Analytics trackers and Backdoor Access
Veterans Administration Hacked by foreign orgs, security needs standardization
Letter of Recommendation - Holt(1)
Merit Systems Protection Board Docket Number SF-0752-11-0427-I-1
Ron Wyden
A flaw in Microsoft's Internet Explorer
NSA's Secret Google-Like Search Engine for Metadata Analysis
Beacons
Analytics Trackers
Andrzejewski, Barbara

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Electronic commerce courselecture one. Pdf
MIND Revenue Release Quarter 2 2025 Press Release
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Electronic commerce courselecture one. Pdf

Bash software bug could be bigger threat than heartbleed, experts warn

  • 1. Bash software bug could be bigger threat than Heartbleed, experts warn Newly discovered bug is rated high for severity and low for complexity, meaning it may be easy for hackers to exploit Reuters in Boston theguardian.com, Wednesday 24 September 2014 22.13 EDT Jump to comments (0) a young computer expert studying at an internet security training centre Computer users have been warned of a new threat to data security. Photograph: Jung Yeon-je/AFP/Getty Images A newly discovered security bug in a widely used piece of Linux software, known as Bash, could pose a bigger threat to computer users than the Heartbleed bug that surfaced in April, cyber experts have warned. Bash is the software used to control the command prompt on many Unix computers. Hackers could exploit a bug in Bash to take complete control of a targeted system, security experts said. The Department of Homeland Security’s United States Computer Emergency Readiness Team, or US-CERT, issued an alert saying the vulnerability affected Unix-based operating systems including Linux and Apple’s Mac OS X. Heartbleed allowed hackers to spy on computers but not take control of them, according to Dan Guido, chief executive of the cybersecurity firm Trail of Bits. “The method of exploiting this issue is also far simpler. You can just cut and paste a line of code and get good results,” he said. Tod Beardsley, an engineering manager at cybersecurity firm Rapid7, warned the bug was rated a “10” for severity, meaning it has maximum impact, and rated “low” for complexity of exploitation, meaning it is relatively easy for hackers to launch attacks. “Using this vulnerability, attackers can potentially take over the operating system, access confidential information, make changes etc,” Beardsley said. “Anybody with systems using Bash needs to deploy the patch immediately.” US-CERT advised computer users to obtain operating systems updates from software makers. It said Linux providers including Red Hat had already prepared them, but it did not mention an
  • 2. update for OS X. Apple representatives could not be reached. Tavis Ormandy, a Google security researcher, said via Twitter that the patches seemed “incomplete”. Ormandy could not be reached to elaborate, but several security experts said a brief technical comment provided on Twitter raised concerns. “That means some systems could be exploited even though they are patched,” said Chris Wysopal, chief technology officer with the security software maker Veracode. He said corporate security teams had spent Wednesday combing their networks to find vulnerable machines and patch them, and they would probably be taking other precautions to mitigate the potential for attacks in case the patches proved ineffective. “Everybody is scrambling to patch all of their internet-facing Linux machines. That is what we did at Veracode today,” he said. “It could take a long time to get that done for very large organisations with complex networks.” Heartbleed, discovered in April, is a bug in an open-source encryption software called OpenSSL. The bug put the data of millions of people at risk as OpenSSL is used in about two-thirds of all websites. It also forced dozens of technology companies to issue security patches for hundreds of products that use OpenSSL. Bash is a shell, or command prompt software, produced by the non-profit Free Software Foundation. Officials with that group could not be reached for comment.