{"id":55349,"date":"2014-09-26T16:05:00","date_gmt":"2014-09-26T21:05:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/caution-watch-out-for-shellshock-the-latest-vulnerability-thats-spreading-rapidly-could-potentially-be-more-dangerous-than-the-infamous-heartbleed\/"},"modified":"2014-09-26T16:05:00","modified_gmt":"2014-09-26T21:05:00","slug":"caution-watch-out-for-shellshock-the-latest-vulnerability-thats-spreading-rapidly-could-potentially-be-more-dangerous-than-the-infamous-heartbleed","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/caution-watch-out-for-shellshock-the-latest-vulnerability-thats-spreading-rapidly-could-potentially-be-more-dangerous-than-the-infamous-heartbleed\/","title":{"rendered":"Caution: Watch Out for Shellshock, the Latest Vulnerability That\u2019s Spreading Rapidly!"},"content":{"rendered":"

\"BashCould Potentially Be More Dangerous Than the Infamous Heartbleed!<\/p>\n

A major vulnerability, CVE-2014-6271, has been spreading rapidly and impacting a wide range of businesses. CVE-2014-6271, also known as “shellshock,” impacts “bash” software, which is used in most business computers. According to some researchers, shellshock could potentially be more dangerous than heartbleed, the open\/SSL bug that had most business owners in a state of panic about their security a few months ago!<\/p>\n

So how does the shellshock vulnerability work? Well, the vulnerability allows attackers to inject their own malicious code into bash, a command line interface that connects users to Unix-based systems. Once the attacker injects malicious code into bash, they’re able to:<\/p>\n