{"id":55187,"date":"2014-09-26T13:32:00","date_gmt":"2014-09-26T18:32:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/security-warning-your-computer-systems-may-be-at-risk-for-exploitation-due-to-the-dangerous-bash-vulnerability\/"},"modified":"2014-09-26T13:32:00","modified_gmt":"2014-09-26T18:32:00","slug":"security-warning-your-computer-systems-may-be-at-risk-for-exploitation-due-to-the-dangerous-bash-vulnerability","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/security-warning-your-computer-systems-may-be-at-risk-for-exploitation-due-to-the-dangerous-bash-vulnerability\/","title":{"rendered":"Security Warning: Your Computer Systems May Be at Risk for Exploitation Due to the Dangerous \u201cBash\u201d Vulnerability!"},"content":{"rendered":"

\"BASH\"A major high severity vulnerability, CVE-2014-6271, has been spreading quickly and impacting a wide range of businesses! The vulnerability, also known as “bash,” involves a UNIX type command shell that’s included in most distributions of Apple OS X and Linux. So how does the vulnerability work? An attacker is able to exploit the vulnerability, then create environment variables that include malicious code.<\/p>\n

The vulnerability is dangerous due to the ease of exploitation. What does ease of exploitation mean? Well, in the simplest terms, an attacker can:<\/p>\n