It’s been called worse than Heartbleed, and according to some news outlets, it could leave your systems even more exposed to hackers.
Known as “Shellshock,” this bug (or glitch) has exposed millions of systems to a serious software vulnerability. It is especially concerning for Linux- and Unix-based operating systems and Mac OS X users, who are particularly vulnerable to the type of attack this glitch allows hackers to use.
According to the Technology Review, Shellshock was first discovered in a software package known as Bash (software used to control the command prompt on Unix-based operating systems) on September 24. The vulnerability in Bash enables an attacker to remotely execute code on a system—a task that could be used to create a self-replicating worm that could infect countless systems with the same vulnerability in short order. Worse, exploiting the vulnerability doesn’t require the skills of an advanced hacker.
As of Monday, September 29, Apple users have access to patches for the Mac operating systems Mavericks, Mountain Lion and Lion, although some security experts aren’t convinced the patches are “patchy enough.”
NetStandard was able to provide protection for our Myappsanywhere hosted applications and AccessPortal customers as early as last week through our relationship with Radware. We were also able to provide protection from this vulnerability to customers currently leveraging our non-volumetric DDoS protection services.
The Shellshock bug will have no impact on these customers.
For our customers leveraging other services, we can offer protection from Shellshock in the form of vulnerability assessments and scanning tools. Please contact your Technology Manager or our sales team to learn more about these options.
NBC News reports that companies, including Amazon and Google, have issued warnings about Shellshock despite Apple’s reported patch. Meanwhile, Kaspersky Labs has already identified Bash-related attacks.