New ‘Bash’ software bug may pose bigger threat than ‘Heartbleed’

[Note:  This item comes from friend Steve Goldstein.  DLH]

New ‘Bash’ software bug may pose bigger threat than ‘Heartbleed’
By JIM FINKLE
Sep 24 2014
<http://www.reuters.com/article/2014/09/24/us-cybersecurity-bash-idUSKCN0HJ2FQ20140924>

(Reuters) – A newly discovered security bug in a widely used piece of Linux software, known as “Bash,” could pose a bigger threat to computer users than the “Heartbleed” bug that surfaced in April, cyber experts warned on Wednesday.

Bash is the software used to control the command prompt on many Unix computers. Hackers can exploit a bug in Bash to take complete control of a targeted system, security experts said.

The Department of Homeland Security’s United States Computer Emergency Readiness Team, or US-CERT, issued an alert saying the vulnerability affected Unix-based operating systems including Linux and Apple Inc’s (AAPL.O) Mac OS X.

The “Heartbleed” bug allowed hackers to spy on computers but not take control of them, according to Dan Guido, chief executive of a cybersecurity firm Trail of Bits.

“The method of exploiting this issue is also far simpler. You can just cut and paste a line of code and get good results.”

Tod Beardsley, an engineering manager at cybersecurity firm Rapid7, warned the bug was rated a “10” for severity, meaning it has maximum impact, and rated “low” for complexity of exploitation, meaning it is relatively easy for hackers to launch attacks. 

“Using this vulnerability, attackers can potentially take over the operating system, access confidential information, make changes, et cetera,” Beardsley said. “Anybody with systems using Bash needs to deploy the patch immediately.”  

US-CERT advised computer users to obtain operating systems updates from software makers. It said that Linux providers including Red Hat Inc (RHT.N) had already prepared them, but it did not mention an update for OS X. Apple representatives could not be reached.

Tavis Ormandy, a Google Inc (GOOG.O) security researcher, said via Twitter that the patches seemed “incomplete.” Ormandy could not be reached to elaborate, but several security experts said a brief technical comment provided on Twitter raised concerns.

“That means some systems could be exploited even though they are patched,” said Chris Wysopal, chief technology officer with security software maker Veracode.

He said corporate security teams had spent the day combing their networks to find vulnerable machines and patch them, and they would likely be taking other precautions to mitigate the potential for attacks in case the patches proved ineffective.

[snip]