Safeguard against Shellshock security vulnerabilities
The main advice for computer users is to always check for the latest software updates as soon as possible.
The main advice for computer users is to always check for the latest software updates as soon as possible.
As mentioned recently, Shellshock is the name of a recently discovered security vulnerability that can directly affect the Bash application (Bourne again shell) - allowing bad guys to attack and control remote unprotected Linux or Mac systems.
To determine if the system is compromised by Shellshock security vulnerabilities, first open the Terminal interface, execute the following command:
env x = '() {:;}; echo vulnerable 'bash -c "echo this is a test"
width = "600"
If your Mac OS X or Linux computer system is potentially at risk from the security hole, the Terminal interface will return the results shown below (you will see the 'Vulnerable' message line appear immediately). above the line 'this is a test')
Conversely, if the system has been patched and protected, the Terminal interface will show the message line:
$ env x = '() {:;}; echo vulnerable 'bash -c "echo this is a test" bash:
cảnh báo: x: đang bỏ qua function xác định thử bash: lỗi
nhập sự xác định function cho 'x' này là một thử
width = "600"
So if you get the 'Vulnerable' result, what do you have to do with the system that is at risk? First of all you need to be calm even if you are just a normal computer user. If the computer you are using is behind the protection of a firewall, the possibility of being attacked from the security hole Shellshock has also been significantly reduced - because the bad guys have no way to execute malicious code. harm through the Bash shell on your computer system, unless the bad guys can somehow fool you into executing them right on your computer.
If you are a MAC OS X user, you can rest assured that Apple has also confirmed that with OS X, the system is guaranteed to be safe by default and bad guys will not be able to attack remotely via Bash. shell, unless the user configures using advanced UNIX services. Apple also said it is aggressively deploying a software update for its advanced UNIX service users.
As for Linux, users should not be too frightened because most of the names' distributions such as Red Hat, Ubuntu, Debian, Fedora, CentOS already have these Shellshock security patches. However, according to Red Hat, the code name code CVE-2014-6271 is still incomplete and is still being updated with new updates to enhance user protection. Therefore, as a Linux user, always pay attention to be ready to install the latest updates for your system.
As previously mentioned, Shellshock not only affects computer users but also network devices and Internet-capable devices (IoT). Therefore, the best way to ensure the safety of the patched computer system is the latest firmware update for the network devices you are using.
Besides, in addition to updating the latest patches, firmware, users should also avoid opening suspicious links and emails. You should also not trust the addresses displayed by dragging on each strange link - because hackers now have enough ways to use a valid link to fool you.
Finally, to protect yourself, make sure that anti-virus software, firewalls and devices designed to protect you always get the latest updates.
You should read it
- IBM developed a new technology to patch security holes
- How to scan websites for potential security vulnerabilities with Vega on Kali Linux
- Find security holes on every site with Nikto
- Warning: The number of vulnerabilities in open source software are increasing rapidly
- How to fix BlueKeep security error for Windows 2003, Windows XP, Windows 7, Windows Server 2008
- Security vulnerabilities - basic insights
- 6 enterprise security holes to note
- Microsoft introduced a tool to fix security holes in IE 9 and 10
- 5 common errors in managing security vulnerabilities
- HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
- Detected a security flaw in Lenovo's UEFI firmware, affecting 100 laptop models
- Warning of dangerous vulnerabilities on WinRAR, users should uninstall or upgrade to a new version
Maybe you are interested
The $ 1 million game on Steam is only for 'giants' Instructions to turn off the Spotify Canvas feature How to set up or turn off the AutoPlay feature on Windows 11 How to turn off the Administrator account, Guest hidden in Windows 10 10 great reasons to visit Madrid in 2017 The 15-year-old girl lost her life because of her hair-eating syndrome