A code injection vulnerability in the Bourne again shell (Bash) has been disclosed on the internet. If exploited then arbitrary commands can be executed, and where Bash is used in relation to a network service, for example in CGI scripts on a web server, then the vulnerability will allow remote code execution.
Shellshock: Code injection vulnerability found in Bash | LIVE HACKING - 0 views
-
-
The problem is that Bash does not stop after processing the function definition; it continues to parse and execute any shell commands following the function definition
-
The vulnerability is deemed as critical because Bash is used widely on many types of UNIX-like operating systems including Linux, BSD, and Mac OS X.
- ...1 more annotation...
1 - 2 of 2
Showing 20▼ items per page