{"id":32071,"date":"2014-09-26T18:00:40","date_gmt":"2014-09-27T01:00:40","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=32071"},"modified":"2014-10-02T20:03:00","modified_gmt":"2014-10-03T03:03:00","slug":"shellshock-vulnerability-what-mac-os-x-users-need-to-know","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/","title":{"rendered":"Shellshock Vulnerability: What Mac OS X Users Need to Know"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/aim-high\/\" rel=\"attachment wp-att-32110\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-32110\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-Mac-OS-X.jpg\" alt=\"Shellshock vulnerability Mac OS X\" width=\"599\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-Mac-OS-X.jpg 599w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-Mac-OS-X-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-Mac-OS-X-300x150.jpg 300w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><\/a>The vulnerability is called Shellshock, and it has rocked the security industry to its core. A flaw\u00a0in the \u201cBash\u201d shell\u2014the command line interpreter for Unix-based systems including Linux and Mac OS X\u2014has sent server administrators scrambling to patch their systems.<\/p>\n<p>Security experts are saying this vulnerability is as dangerous, if not more so, than the <a title=\"Heartbleed OpenSSL bug: FAQ for Mac, iPhone and iPad users\" href=\"https:\/\/www.intego.com\/mac-security-blog\/heartbleed-openssl-bug-faq-for-mac-iphone-and-ipad-users\/\" target=\"_blank\">Heartbleed flaw found in OpenSSL software<\/a>\u2014an encryption service used by around two-thirds of websites to protect information sent to and from web pages\u2014back in April. The Shellshock flaw affects the Bash shell used across many Unix-based systems including Mac OS X and variants of Linux.<\/p>\n<p>The Shellshock vulnerability (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6271\" target=\"_blank\">CVE-2014-6271<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-7169\" target=\"_blank\">CVE-2014-7169<\/a>) has been compared to Heartbleed, partly because the software at the heart of the \u201cShellshock\u201d bug, known as Bash, is also widely used in web servers and other types of computer equipment.<\/p>\n<p>With <a title=\"Heartbleed Threat Alert Update\" href=\"https:\/\/www.intego.com\/mac-security-blog\/heartbleed-threat-alert-update\/\" target=\"_blank\">Heartbleed<\/a>, somebody could grab credentials of a user and do what they wanted with it; however, the bug only allowed an attacker to steal data. But with Shellshock, if someone is vulnerable, an attacker could insert malicious pieces of code from a remote location and get full system control of a victim\u2019s machine.<\/p>\n<p>Fortunately, the Shellshock vulnerability is unlikely to affect as many systems as Heartbleed, because not all computers running Bash can be exploited.<\/p>\n<h3>How to tell if your Mac is vulnerable<\/h3>\n<p>If you have a Mac OS X or Linux system, open the Terminal and run this line of code:<\/p>\n<pre><strong>env x='() { :;}; echo vulnerable' bash -c 'echo this is a test'<\/strong><\/pre>\n<p>If it returns the word \u201cvulnerable\u201d as an answer, then your machine is in theory vulnerable.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/how-to-tell-if-mac-is-vulnerable-to-shellshock\/\" rel=\"attachment wp-att-32089\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-32089\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/How-to-Tell-if-Mac-is-Vulnerable-to-Shellshock.png\" alt=\"Mac OS X vulnerable to Shellshock\" width=\"507\" height=\"367\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/How-to-Tell-if-Mac-is-Vulnerable-to-Shellshock.png 507w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/How-to-Tell-if-Mac-is-Vulnerable-to-Shellshock-150x108.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/How-to-Tell-if-Mac-is-Vulnerable-to-Shellshock-300x217.png 300w\" sizes=\"(max-width: 507px) 100vw, 507px\" \/><\/a><\/p>\n<p>Here\u2019s what that means, as mentioned over at <a href=\"http:\/\/www.engadget.com\/2014\/09\/25\/what-is-the-shellshock\/\" target=\"_blank\">Engadget<\/a>:<\/p>\n<blockquote><p>Your Bash shell is simply running more code after a function (the \u201c() { :;};\u201dpart), and that shouldn\u2019t be happening. The function is the \u201callowed\u201d code, while everything after it is where the potentially \u201cmalicious\u201dcode could be installed.<\/p><\/blockquote>\n<p>But\u2014this is important\u2014if your Mac is \u201cvulnerable,\u201d all this means is that your default shell is Bash. The only way for infections to occur is by exposing this vulnerability on a Mac.<\/p>\n<p>If someone were to write an app that contained the exploit, a user downloaded the app, bypassed Gatekeeper (it would have to be an unsigned, unsandboxed app) and ran the app anyway, then yes\u2014a Mac user could potentially get malware this way.<\/p>\n<h3>What exposes your Mac to Shellshock<\/h3>\n<p>There are two routes to exposing this vulnerability to a remote attack on a Mac:<\/p>\n<p><strong>Route 1<\/strong><\/p>\n<ol>\n<li>Go into System Preferences &gt;\u00a0Sharing and turn on Remote Login<\/li>\n<li>In the same location, turn on All Users<\/li>\n<li>Go into System Preferences &gt;\u00a0Users &amp; Groups and make sure Guest Access is enabled<\/li>\n<\/ol>\n<p>Your system is now vulnerable. If you don\u2019t enable guest access your system is still vulnerable if the attacker knows or is able to guess your username and password. But as this connection is secured, they can\u2019t get that from packet sniffing. And enabling a guest shell on a box is probably not the most secure thing to do anyway.<\/p>\n<p><strong>Route 2<\/strong><\/p>\n<p>This route requires OS X Server, an old (Lion or earlier) version of OS X, or for the user to install Apache\/PHP\/some other scripting environment.<\/p>\n<ol>\n<li>Enable Apache and have it running<\/li>\n<li>Enable Apache to run scripts or execute extensions<\/li>\n<li>Have one of those scripts or extensions vulnerable to malicious attacking (being able to inject something into the script that gets executed)<\/li>\n<\/ol>\n<p>The attacker can then insert the variables into the script or extension that gets run under the Bash shell, then the injection gets into the Shellshock vulnerability, and voila\u2014machine compromised. This one, however, requires exploiting two holes. First, in the script running on Apache, and then in turn using that compromised script to send something to the Bash shell.<\/p>\n<p><strong>What this means\u00a0<\/strong><\/p>\n<p>As you can see, these are both edge cases. And both routes probably require a level of technical expertise that the person configuring their account as such can patch the exploit fairly simply.<\/p>\n<p>Also note that for route 1, enabling a Bash shell with Guest access for remote login most likely opens up your system to many other possible attacks. The difference Shellshock provides is access to root privileges, in other words full machine access to said Guest user.<\/p>\n<p>The bigger issue is all the devices with embedded Unix, where telnet (unsecured) access is enabled, and no login is required. These typically are \u201cThe Internet of Things\u201d (IoT) devices. Even if they require an administrator password other then \u201cAdmin\u201d to get change settings, Shellshock may now give the attacker root to do whatever they want on the device.<\/p>\n<h3>What can an attacker do to your Mac?<\/h3>\n<p>Basically, an attacker can run code by simply asking for basic information from your computer, a server or an IoT device. &#8220;The remote execution (over the Internet or a network) of extra code could let an attacker load malware on a system and steal private information, delete files, activate your camera, open a lock and, well, do pretty much anything with a little know-how,&#8221; mentioned\u00a0Jose Andrade at <a title=\"What is the Shellshock Bash bug and why does it matter?\" href=\"http:\/\/www.engadget.com\/2014\/09\/25\/what-is-the-shellshock\/\" target=\"_blank\">Engadget<\/a>.<\/p>\n<p>However, the Engadget article also mentions \u201cyour computer is most likely unaffected\u201d if you are running a firewall that blocks external requests not initiated locally by the software already authorized to run. This suggests that if a Mac is running firewall software, such as <a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego NetBarrier<\/a>, it has not been proven possible to take advantage of the bug under that scenario.<\/p>\n<p>Unfortunately, the Bash Shellshock bug is wormable, and can easily worm past firewalls and infect lots of systems, according to Robert Graham at <a href=\"http:\/\/blog.erratasec.com\/2014\/09\/bash-shellshock-bug-is-wormable.html#.VCXKU977r8u\" target=\"_blank\">Errata Security<\/a>. Robert explained:<\/p>\n<blockquote><p>\u201cOne key question is whether Mac OS X and iPhone DHCP service is vulnerable \u2013once the worm gets behind a firewall and runs a hostile DHCP server, that would be \u2018game over\u2019 for large networks.\u201d<\/p><\/blockquote>\n<p>And, worse, protecting a server is\u00a0another issue but different, because a server must listen to requests in order to do its job. Engadget&#8217;s Jose Andrade provided a good overview of this problem:<\/p>\n<blockquote><p>This means that by requesting almost any data and running malicious code, an attacker can infect any affected server, which is about 60 percent of web servers out on the internet, most routers (even your home router) and many consumer devices (including security cameras and &#8220;smart&#8221; appliances &#8212; which don&#8217;t seem so smart right about now). This is because smart appliances are a form of servers.<\/p><\/blockquote>\n<h3>Have hackers figured out how to exploit the Shellshock vulnerability?<\/h3>\n<p>With the media spotlight on the Shellshock vulnerability, in just one day after discovery, hackers have most likely\u00a0figured out how to exploit it. Intego has seen proof-of-concept exploits so far on Mac OS X, and we are continuing to research this threat and will continue to provide updates as new information becomes available.<\/p>\n<h3>How can the Shellshock vulnerability be resolved?<\/h3>\n<p>In a statement to <a href=\"http:\/\/www.imore.com\/apple-working-quickly-protect-os-x-against-shellshock-exploit\" target=\"_blank\">iMore<\/a>, an Apple representative disclosed the following:<\/p>\n<blockquote><p>The vast majority of OS X users are not at risk to recently reported Bash vulnerabilities.\u00a0Bash, a UNIX command shell and language included in OS X, has a weakness that could allow unauthorized users to remotely gain control of vulnerable systems. With OS X, systems are safe by default and not exposed to remote exploits of bash unless users configure advanced UNIX services. We are working to quickly provide a software update for our advanced UNIX users.<\/p><\/blockquote>\n<p>According to Apple, there is a patch coming soon for Mac users who could be exposed.<\/p>\n<h3>What can you\u00a0do to stay protected?<\/h3>\n<p>Until Apple patches this hole, which they no doubt will, you can take a few simple steps to make sure you\u2019re not exposed:<\/p>\n<ol>\n<li>Don\u2019t enable Guest Access AND at the same time enable All Users for Remote Login.<\/li>\n<li>Don\u2019t run a Web server on your personal machine.<\/li>\n<li>Have a strong password on your Account.<\/li>\n<li>Keep Gatekeeper turned &#8220;On.&#8221;<\/li>\n<li>Only install or run signed Apps from trusted sources.<\/li>\n<li>For extra protection install a Firewall, such as\u00a0<a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego NetBarrier<\/a>.<\/li>\n<\/ol>\n<p><strong>UPDATE:\u00a0<a title=\"Apple\u2019s OS X Bash Update 1.0 Patches Shellshock Vulnerability\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-bash-update-1-0-patches-shellshock-vulnerability\/\" target=\"_blank\">Apple\u2019s OS X Bash Update 1.0 Patches Shellshock Vulnerability<\/a><\/strong><\/p>\n<p>Also remember, these are probably good security rules to adhere to even after Apple patches this hole, just to insure you don\u2019t fall victim to the next one yet\u00a0be discovered.<\/p>\n<h3>Where to get more information<\/h3>\n<p><a href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2014\/09\/24\/Bourne-Again-Shell-Bash-Remote-Code-Execution-Vulnerability\" target=\"_blank\">US-CERT<\/a> recommends Mac OS X users (and pretty much anyone concerned about the flaw) seek\u00a0help from the <a href=\"https:\/\/securityblog.redhat.com\/2014\/09\/24\/bash-specially-crafted-environment-variables-code-injection-attack\/\" target=\"_blank\">Redhat Security Blog<\/a>, or consult their respective Linux or Unix operating system vendor for advice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The vulnerability is called Shellshock, and it has rocked the security industry to its core. A flaw\u00a0in the \u201cBash\u201d shell\u2014the command line interpreter for Unix-based systems including Linux and Mac OS X\u2014has sent server administrators scrambling to patch their systems. Security experts are saying this vulnerability is as dangerous, if not more so, than the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":32125,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151,5],"tags":[3151,1468,1465,1474,309,174,80,1462,1471,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The vulnerability is called Shellshock, and it has rocked the security industry to its core. A flaw\u00a0in the \u201cBash\u201d shell\u2014the command line interpreter for\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shellshock Vulnerability: What Mac OS X Users Need to Know - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The vulnerability is called Shellshock, and it has rocked the security industry to its core. A flaw\u00a0in the \u201cBash\u201d shell\u2014the command line interpreter for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-27T01:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-10-03T03:03:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-vulnerability.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-vulnerability.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-vulnerability.jpg\",\"width\":400,\"height\":260,\"caption\":\"Shellshock Mac OS X vulnerability\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/\",\"name\":\"Shellshock Vulnerability: What Mac OS X Users Need to Know - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#primaryimage\"},\"datePublished\":\"2014-09-27T01:00:40+00:00\",\"dateModified\":\"2014-10-03T03:03:00+00:00\",\"description\":\"The vulnerability is called Shellshock, and it has rocked the security industry to its core. A flaw\\u00a0in the \\u201cBash\\u201d shell\\u2014the command line interpreter for\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shellshock Vulnerability: What Mac OS X Users Need to Know\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Shellshock Vulnerability: What Mac OS X Users Need to Know\",\"datePublished\":\"2014-09-27T01:00:40+00:00\",\"dateModified\":\"2014-10-03T03:03:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#webpage\"},\"wordCount\":1422,\"commentCount\":32,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-vulnerability.jpg\",\"keywords\":[\"Apple\",\"Bash\",\"CVE-2014-6271\",\"CVE-2014-7169\",\"Linux\",\"Mac\",\"Mac OS X\",\"Shellshock\",\"Unix\",\"Vulnerability\"],\"articleSection\":[\"Malware\",\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The vulnerability is called Shellshock, and it has rocked the security industry to its core. A flaw\u00a0in the \u201cBash\u201d shell\u2014the command line interpreter for","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Shellshock Vulnerability: What Mac OS X Users Need to Know - The Mac Security Blog","og_description":"The vulnerability is called Shellshock, and it has rocked the security industry to its core. A flaw\u00a0in the \u201cBash\u201d shell\u2014the command line interpreter for","og_url":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-09-27T01:00:40+00:00","article_modified_time":"2014-10-03T03:03:00+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-vulnerability.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-vulnerability.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-vulnerability.jpg","width":400,"height":260,"caption":"Shellshock Mac OS X vulnerability"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/","name":"Shellshock Vulnerability: What Mac OS X Users Need to Know - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#primaryimage"},"datePublished":"2014-09-27T01:00:40+00:00","dateModified":"2014-10-03T03:03:00+00:00","description":"The vulnerability is called Shellshock, and it has rocked the security industry to its core. A flaw\u00a0in the \u201cBash\u201d shell\u2014the command line interpreter for","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Shellshock Vulnerability: What Mac OS X Users Need to Know"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Shellshock Vulnerability: What Mac OS X Users Need to Know","datePublished":"2014-09-27T01:00:40+00:00","dateModified":"2014-10-03T03:03:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#webpage"},"wordCount":1422,"commentCount":32,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-vulnerability.jpg","keywords":["Apple","Bash","CVE-2014-6271","CVE-2014-7169","Linux","Mac","Mac OS X","Shellshock","Unix","Vulnerability"],"articleSection":["Malware","Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/Shellshock-vulnerability.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-8lh","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32071"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=32071"}],"version-history":[{"count":26,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32071\/revisions"}],"predecessor-version":[{"id":32209,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32071\/revisions\/32209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/32125"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=32071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=32071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=32071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}