Allowing remote access to bash is vulnerable by definition, it's not a bug but a feature. It doesn't look like dhcp is affected on OS X btw, you need a service that sets environment variables from user input.
typical online media always blowing things out of proportion
So, ssh is probably safe, but depending on what system level CGI shell scripts you're running on your webserver (not PHP) you may be vulnerable.
Next, Ultrix, SunOS, OSF/1, and Irix
I am not sure you understand the nature of the problem. You don't have to allow direct remote access to bash. The shell can be invoked indirectly, say by the web server.
These operating systems haven't been current for about 20 years. They're likely vulnerable to 100 other remote exploits found since they were last updated.Next, Ultrix, SunOS, OSF/1, and Irix
I understand, I'm not referring to remote access as in being logged in remotely, but passing user input blindly to a shell. That is not the issue here, it's also not an issue with the shell per se.
You didn't edit your list enough. SunOS was updated this year; IRIX was last updated around 2006.
Data to the CGI scripts is passed via environment variables. By crafting malicious user agent strings or remote user names, you can exploit the vulnerability. This can be as easy as using wget -U
Connected to the big bad internet....
Its just a PR blurb, using a lot of big words and yet saying nothing. Damage control.
The quicker they roll out the patch, the sooner all the users can be safe.
So my computer is apparently vulnerable. Wonderful!
Yes? But that is not "allowing remote access", it's a bug in bash. It's distinct difference which I pointed out in the first post.
All of you. Spare a thought for those loyal Mac users still running Snow Leopard.
I'm forced to keep my 2006 white, matte-screen iMac because Apple won't make anti-glare screen iMacs anymore. While the current iMacs have less glare, you can still use it as a mirror.
you can check if your machine is vulnerable http://lifehacker.com/how-to-check-if-your-mac-or-linux-machine-is-vulnerable-1639211806
Who makes up these trite "names" for these exploits? "Heardbleed"?? "Shellshock"??
Heartbleed is a SSH exploit and Shellshock a Bash exploit.
Next terrible exploit: Nerveshocker.![]()
In case someone is missing the reason for these "names":
Heartbleed is about a bug in the OpenSSL TSL heartbeat extension leaking information. Heartbeat leaking -> Heartbleed.
Sheeshock is about a bug in bash, which is a very common Linux and Unix command line shell. Shell -> Shellshock.
You must be fun at parties.So they're puns. Even worse
Heartbeats don't leak. Shells do not become shocked. I thought this was stupid before. Thanks for the explanation, but made up names would have been slightly better than puns.
So they're puns. Even worse
Heartbeats don't leak. Shells do not become shocked. I thought this was stupid before. Thanks for the explanation, but made up names would have been slightly better than puns.
Why not get a mac mini and use a monitor of your choice ^_^ - I simply could not function with a 2006 computer today.