Just FYI, this doesn't affect web servers only, you can also exploit it if you have "Remote Login" enabled in Sharing (tho it's much, much harder).
How? I don't see it.
Just FYI, this doesn't affect web servers only, you can also exploit it if you have "Remote Login" enabled in Sharing (tho it's much, much harder).
How? I don't see it.
I remember all the y2k crap and it came and nothing happened.
you can check if your machine is vulnerable http://lifehacker.com/how-to-check-if-your-mac-or-linux-machine-is-vulnerable-1639211806
thanks. that's what I thought and I was wondering if I am missing something.You can't. The person doesn't know what they're talking about. Please see my other posts for accurate info.
This just says whether your version of Bash is vulnerable or not (which, unless you've manually updated Bash within the past two days, it is.) It doesn't actually determine if there's any way a hacker could exploit that on your computer.
IE, I'm running VNC and Apache off of a Mac Mini (with port 80 and whatever port VNC uses being exposed to the open internet). Is there some way those could be exploited by hackers? (And I know the VNC is dumb... At some point I want to move from a password system to a key system for it...)
Apple is having a bad week.
Everything now a days gets blown out of proportion. I remember all the y2k crap and it came and nothing happened. Now we hear about bending iPhones and this and none of this stuff is affecting more than 1% of anyone out there. This is why i don't even read these stories on the news online or watch local news
The reason "nothing happened" is in no small part due to all the work that was done to prepare.
You can't. The person doesn't know what they're talking about. Please see my other posts for accurate info.
Just FYI, this doesn't affect web servers only, you can also exploit it if you have "Remote Login" enabled in Sharing (tho it's much, much harder).
Many 3rd-party apps, like media hubs and some torrent clients, start local webservers that may be susceptible as well.
Let's hope that Apple has the patch out soon, and that they'll fix older OS versions as well.
Lynx and Pine?![]()
Michael R. Elkins said:All mail clients suck. Mutt just sucks less.
All of you. Spare a thought for those loyal Mac users still running Snow Leopard.
I'm forced to keep my 2006 white, matte-screen iMac because Apple won't make anti-glare screen iMacs anymore. While the current iMacs have less glare, you can still use it as a mirror.
What does SSH login have to do with it? Does the authentication process set user-defined env variables? I've read about 4 explanations of this bug already, and they haven't explained it well, so I don't know if I'm right: From what I understand, the flaw is that someone can run a command by making your computer/server set an environmental variable to "() { :;}; insert_command_here". So if you have something taking requests and setting environmental variables based on user input without any checking, you're vulnerable. It's like SQL injection attacks in a way.
What this means is that virtually ALL unix web servers that rely on CGI scripts (quite a lot of them do) are vulnerable. This is a total disaster.
Many services and apps "shell out" to run commands, setting env vars based on user input. Among them web servers, SSH, DHCP, and others.
Imagine someone managing to exploit DHCP to manipulate your local system and then use it to manipulate things you connect to. Plus there are likely undiscovered variations of this yet.
This is why all systems should always be patched as quickly as possible. Apple waiting to release a patch and saying that normal users won't be affected is dangerous and a sign that they don't have their **** together when it comes to security.
Who makes up these trite "names" for these exploits? "Heardbleed"?? "Shellshock"??
Heartbleed is a SSH exploit and Shellshock a Bash exploit.
Next terrible exploit: Nerveshocker.![]()
Where can I find updates to SunOS 4.1.4? Are you sure you're not thinking of Solaris (which I removed from the list)?
And 2006 was 8 years ago, which is still an eternity in Internet security terms.
You don't need to have exposed services to the big wide Internet to possibly be vulnerable. Just using your computer in a public network might be a risk.
/bin/sh is used in tons of places on Unix computers:
Lynx and Pine?![]()