Shellshock and some information

I have had trouble emailing this information to some folks I work with, so I am posting here for reference and benefit for others.

I am sending this out far and wide since I work with many places…so please stop and read for a moment if you have not been alerted.

I am sure some of you are aware of this already, but if not I would take stock of this quickly and get a handle on what you need to do.There is a new bug being exploited in the wild going by the name of “shellshock” or “shellshocked”

Many *nix web servers running or external devices that rely on bash shell should be looked at (Linux, MacOS, etc). The obvious threat are web servers and other server utilities externally accessible, but you also need to think about your embedded devices that could be vulnerable.

Feel free to pass this along to whoever, but I suggest not waiting and being proactive in engaging your vendors to find out your risks.

Apple computers are addressable also, but likely lower risk (link below) unless being used for advanced things. I would pay more attention to your infrastructure, firewalls, VPN devices, and web servers, then work on the “inside” of your network .

All of you that work with me know I suggest the M&M security strategy of keeping a hard outer shell while you work on the “soft” middle 🙂

Links and info below…Feel free to contact me directly to discuss if you feel the need.

WSJ – overview

National Vulnerability Database (NVD)

ISC has moved to infocon:yellow with some background info

Below are some vendor links related to this that you should review if relevant to the technology you are using.












Webserver checking tool

Comments are closed