Online Applications

Custom Search

Sunday, 28 September 2014

The Shellshock command security flaw isn't really fixed yet


The Shellshock command security flaw isn't really fixed yet

Don’t get too comfy just because companies are rolling out patches for the Shellshock security bug — as it turns out, even updated websites and devices remain at risk. Developers are reporting that they can still run any code they like (and thus hijack systems) through the bash command shell simply by using instructions that aren’t covered by existing safeguards. You can use a common variable like “cat” (concatenate) to bypass the defenses, for instance. The only surefire fix may be a fundamental change to how the shell handles variables, which could break legions of apps and services. You still don’t have much reason to worry about your home Mac or Linux PC, but it’s now considerably less likely that the sites and connected gadgets you use will will be truly immune to Shellshock-based attacks.


[Image credit: Robert Graham, Twitter]



 Hide Comments 0Comments








Apple OS X Yosemite





  • Key specs



  • Reviews 1



  • Prices

  • Discussions


  • Type Computer OS

  • Source model Closed, w/ open source

  • Architecture 64-bit

  • Announced 2014-06-02

see all specs





10average user rating
  • Ease of use 10

  • Speed 10

  • Configurability 0

  • Ecosystem (apps, drivers, etc.) 0

  • Openness 0



Get better reviews from people who actually have this product!


write a reviewsee all reviews →













This article is automatically posted by WP-AutoPost : WordPress AutoBlog plugin
Documentation, WP-AutoPost



No comments:

Post a Comment

Blog Archive