The bug has been dormant for 20 years with the threat of more than bleeding heart

[Abstract]Bash vulnerability allows hackers to send remote control commands to the server, easy to steal private information.

BI Chinese station on September 26th reported

more than network security experts said they found a new network has been hidden in the bug for more than 20 years, this vulnerability is more serious than the heart bleeding loophole threat. Hackers can use it to send commands to the remote server, which means that the affected servers will encounter big trouble.

Bash vulnerability is the software company Red Hat security team found on Wednesday, many experts say the threat is greater than the bleeding heart, which was discovered in April, is still affecting thousands of devices. The impact of Bash on the company than the impact on individuals, because it involves the network server, rather than each user has its own network server.

what exactly is Bash?

Bash is a security vulnerability that allows hackers to issue a remote command to a web server. Because of this bug allows hackers command server to do anything he wants, this information can easily be stolen privacy from the affected servers.

affected web servers and systems use a language interpreter called bash to handle instructions. Network security company Symantec Security Response manager Satnam Narang (Satnam · Narang), a specific version of Linux, Unix and Mac OS X 10 Maverick system also uses bash language interpreter, because it is based on the Unix platform.

pointing does not mean that each device running the Linux system are vulnerable to attack targets Bash vulnerabilities. Network security company Rapid7 global security strategist Terry · (Trey Ford), said: these servers affected by the need for a series of conditions." Ford said that the server is using bash language interpreter is vulnerable to attack, in addition to the server must also be able to remotely command via the internet.

The

Bash vulnerability has existed for about 20 years, but it was not discovered until this week. Ford said: test software is really difficult. Software is written by human beings, and human beings are inherently flawed, that is wrong. These errors are expressed in the form of internal code. Sometimes, these vulnerabilities can be found for a long time."

why is Bash so dangerous?

although the Bash vulnerability is not as much as the bleeding heart loophole affects the device, but the results may be more serious. This is because the Bash vulnerability allows hackers to send remote commands to the server, and the bleeding heart loophole allows intruders to steal information from the server.

Symantec Narang said: "Bas>

[Abstract]Bash vulnerability allows hackers to send remote control commands to the server, easy to steal private information.

BI Chinese station on September 26th reported

more than network security experts said they found a new network has been hidden in the bug for more than 20 years, this vulnerability is more serious than the heart bleeding loophole threat. Hackers can use it to send commands to the remote server, which means that the affected servers will encounter big trouble.

Bash vulnerability is the software company Red Hat security team found on Wednesday, many experts say the threat is greater than the bleeding heart, which was discovered in April, is still affecting thousands of devices. The impact of Bash on the company than the impact on individuals, because it involves the network server, rather than each user has its own network server.

what exactly is Bash?

Bash is a security vulnerability that allows hackers to issue a remote command to a web server. Because of this bug allows hackers command server to do anything he wants, this information can easily be stolen privacy from the affected servers.

affected web servers and systems use a language interpreter called bash to handle instructions. Network security company Symantec Security Response manager Satnam Narang (Satnam · Narang), a specific version of Linux, Unix and Mac OS X 10 Maverick system also uses bash language interpreter, because it is based on the Unix platform.

pointing does not mean that each device running the Linux system are vulnerable to attack targets Bash vulnerabilities. Network security company Rapid7 global security strategist Terry · (Trey Ford), said: these servers affected by the need for a series of conditions." Ford said that the server is using bash language interpreter is vulnerable to attack, in addition to the server must also be able to remotely command via the internet.

The

Bash vulnerability has existed for about 20 years, but it was not discovered until this week. Ford said: test software is really difficult. Software is written by human beings, and human beings are inherently flawed, that is wrong. These errors are expressed in the form of internal code. Sometimes, these vulnerabilities can be found for a long time."

why is Bash so dangerous?

although the Bash vulnerability is not as much as the bleeding heart loophole affects the device, but the results may be more serious. This is because the Bash vulnerability allows hackers to send remote commands to the server, and the bleeding heart loophole allows intruders to steal information from the server.

Symantec Narang said: "Bas>

Leave a Reply

Your email address will not be published. Required fields are marked *