Bash Bug May Be Worse Than Heartbleed

Linux, Unix, and Internet of Things devices affected by critical vulnerability.

Sara Peters, Senior Editor

September 24, 2014

2 Min Read
Dark Reading logo in a gray background | Dark Reading

Though only disclosed this morning, proof-of-concept exploits are already available for a critical remote code execution vulnerability security experts say is more widespread than Heartbleed.

CVE-2014-6271, a vulnerability in the command shell Bash, affects many Linux- and UNIX-based systems. Although no exploits have yet been seen in the wild, the pervasiveness and ease of exploit have earned it a CVSS score of 10.

The bug makes remote code execution possible, even though Bash itself does not handle data from remote users. As Jim Reavis of Cloud Security Alliance wrote today:

Bash is a local shell, it doesn’t handle data supplied from remote users, sono big deal right? Wrong.

A large number of programs on Linux and other UNIX systems use Bash to setup environmental variables which are then used while executing other programs...

In short this vulnerability allows attackers to cause arbitrary command execution, remotely, for example by setting headers in a web request, or by setting weird mime types for example.

Like Heartbleed, the bug may affect a broad swath of systems -- including Apache servers, web servers running CGI scripts, and embedded systems in everything from control systems to medical devices to digital cameras.

Also like Heartbleed, patching every system that uses Bash is going to be difficult. As Robert Graham of Errata Security wrote:

...while the known systems (like your web-server) are patched, unknown systems remain unpatched. We see that with the Heartbleed bug: six months later, hundreds of thousands of systems remain vulnerable. These systems are rarely things like webservers, but are more often things like Internet-enabled cameras.

Internet-of-things devices like video cameras are especially vulnerable because a lot of their software is built from web-enabled bash scripts. Thus, not only are they less likely to be patched, they are more likely to expose the vulnerability to the outside world.

Rapid7 representatives say that they are working on a Metasploit module to exploit the bug; they expect a first version to be available later today.

Meanwhile, Huzaifa Sidhpurwala of Red Hat released a very simple proof-of-concept exploit of this vulnerability that only requires one line of code.

Dave Kennedy, CEO of TrustSec, says that the proof-of-concept is very simple and would blend in with normal activity more smoothly than most malware.

"You should see it in your logs, if you're looking for it," says Kennedy, "but that's about it."

The good news is that patches are already available. Reavis doubts that the patch would cause any performance problems for the applications that use Bash, but some administrators might decide to put up a web application firewall first, then patch when they can.

Kennedy does not believe that the bug is as bad as Heartbleed "yet," but nevertheless he advises you put aside your usual patch testing processes and simply "patch right now."

About the Author

Sara Peters

Senior Editor

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights