Shellshock Vulnerability Analysis

Verified

Added on  2020/05/11

|7
|1825
|99
AI Summary
This assignment delves into the Shellshock vulnerability, a critical flaw affecting various Unix-based operating systems like Linux and Mac OS X. It explains how this vulnerability can be exploited by attackers to gain control over compromised systems. The report outlines the scope of the vulnerability, its potential impact on users and networks, and provides detailed information about available patches and mitigation techniques to secure affected devices.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
1
Shellshock vulnerability
Name
Course
Professor
School
City
Date

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
Introduction
The shellshock vulnerability is a vulnerability is a new vulnerability which has been found to
affect the majority of models of the Linux as well as the Unix operating technologies as well as
the Mac OS X (centered on the Unix). This susceptibility can be considered Bash Bug which is
GNU Remote Code Execution vulnerability (CVE-2014-6271) that might permit a hacker to
acquire the control over the specific computer in the event it has been used effectively.
This vulnerability affect the Bash that is the typical element that is often referred to as the shell
that appears to be most versions in numerous versions of the Unix and Linux (Bull & Matthews,
2014). Moreover, the Bash could be used in running of the commands that are transferred to it by
means of an application which is this feature which the vulnerability impacts (Bull & Matthews,
2014). In this research, it would highlight how this vulnerability is exploited, the scope of the
vulnerability, the impact of the vulnerability and how to minimize the risk to the businesses as
well as to the consumers.
How shellshock vulnerability is exploited
This vulnerability could be exploited through a remote attacker to various situations. For the
attackers to have a successful attack, they need to force a given program to send out detrimental
environment variable to the Bash (Casula, 2014). The majority of effective route which the
attackers use is through the internet server’s usage that is regarded as the CGI. This really is the
commonly used system to generate the dynamic Web content (Pieczul and Foley, 2016). A
possible attacker may use the CGI to send a malformed environment variable to the website
server that is susceptible. The server makes use of Bash to examine the variable, therefore this
can also operate any specific malicious command that is subjected to it.
The consequences of a hacker effectively taking advantage of this vulnerability on the Web are
Document Page
3
really serious in nature. For instance, attackers may have the capacity to get rid of the password
files or just download malware to the computer which is contaminated (Casula, 2014). Once
inside the firewalls of the victims the attacker might compromise as well as infect the other
computer systems on the network (Delamore and Ko, 2015). Aside from the Web servers other
vulnerable devices that can be used are the Linux-based routers that have the Web user interface
which utilizes CGI. Correspondingly which an attack can occur against the Web server, it may
be easy to utilize the CGI and benefit from the vulnerability along with send the malicious
command to the router (Delamore and Ko, 2015). Additionally, the Internet of Things (IOT) in
addition to embedded equipment for example the routers might be susceptible if they are
functioning utilizing bash. Nonetheless, the current devices operate the set of tools referred to as
the BusyBox that gives an alternative to the Bash.
Scope of shellshock vulnerability
This vulnerability possibly affects most of the variations of the Linux and Unix operating-
system. The following is a summary of the exploits that have been known up to date;
• The plain “vulnerability checks’’ which employed the custom User-Agents
• Bots employing the shellshock weakness
• The susceptibility verify using the several headers
• Using the user-Agent to report the system parameters back.
The following are the up-to-date CVEs for the Shellshock vulnerability;
CVE-2014-6271: It was the original “Shellshock” Bash bug. When people refers to the Bash bug
or even the “Shellshock’’ they are talking about the CVE.
CVE-2014-169: This continues to be the CVE which was assigned to the incomplete patch for
the original bug (Yamaguchi, Maier, Gascon and Rieck, 2015). The original patch was identified
Document Page
4
to be incomplete soon after the vulnerability was announced publicly (Casula, 2014). The
variation to the original malicious syntax may have permitted the hacker to undertake not
authorized measures that might consist of to the arbitrary files.
The CVE 2014-7186 and CVE-2014-7187: These two CVEs are for the bugs that were identified
in relation to the original Bash bug (Casula, 2014). These types of bugs were triggered by the
syntax that is a lot similar to the original Bash bug , but alternatively the command injection ,
they allows for away from the bound memory access (Mary, 2015). There has been simply no
proof that these types of bugs might have remote vectors so they have never been identified in
the wild.
The impact of this vulnerability
The reason as to why this vulnerability has raised some problems is the breadth in threats vectors
that are offered to the attackers (Mary, 2015). An illustration , a simple task of loading a website
offers the attacker with opportunity of taking advantage of the vulnerability in the event that the
servers handling the request of the website to utilize the bash commands in order to access the
data that has been requested.
The attackers are making use of this kind of vulnerability in order to exploit the system. There
are various researchers who have reported that the honeypot infrastructure has been attacked by
group taking advantage of the Bash susceptibility (Mary, 2015). This susceptibility is allowing
the installation of the zero bash injection ELF malware which has been used currently.
How to minimize the vulnerability to the business and consumer.
There are various methods for detections which are used in mitigating of this risk. Given that the
Bash influences the versions 1 .14 through 4 .3 of the Bash Shell, improving on the latest model

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5
could mitigate on this risk. With regards to the web application standpoint, the bug could be
exploited through the code which transmits through the Bash interpreter. The CGI’s as well as
the CGI scripts might be the most impacted, however anything that is passed to the Bash
interpreter might be exploited (Yamaguchi, Maier, Gascon and Rieck, 2015). The command
execution might be accomplished through the HTTP Headers in addition to the GET parameters
to the systems which are susceptible. Therefore, one may utilize the web software firewall to be
able to monitor on the vulnerability in the header. Further, a signature could be added to the GET
field. This signature could be utilized for monitoring the attempts for almost any bypass
detection signature by means of the numerous whitespace through use of the command (Huang,
Liu, Fang and Zuo, 2016). Additionally, the use of the IPS/ IDS could be useful in detecting of
any kind of network communication and they could also notify one when there has been
establishment of a connection and there are commands that are executed (Muscat, 2016). For the
businesses, especially the owners of websites, are at most at risk of this kind of a bug, therefore,
they should know its exploitation might permit usage of their data and provide the hackers with
the foothold to their network (Delamore, 2014). Furthermore, you will need to apply any
accessible patches immediately to prevent the attackers. A few of the Linux vendors have issued
the security advisories to the recently discovered susceptibility including the patching data these
are as below figure.
Figure 1: The diagram shows the patching information for the Linux application.
Document Page
6
To the part of the consumers they really should utilize the patches to their routers as well as any
devices which are enabled in the web (Huang, Liu, Fang and Zuo, 2016). The customers of the
Apple’s Mac OS X must be conscious which of the operating-system that are presently are
shipped with the susceptible model of the Bash. Moreover, the Mac users might utilize any
specific patches for the OS X in the event they become accessible.
Conclusion
Shellshock is a new vulnerability which has been discovered to affect the versions of Unix,
Linux along with the Mac OS X. This attacked has enabled the attacker to gaining the control
over the targeted computer in the event it has been exploited successfully. In this research, it has
highlighted what is this vulnerability, how it could be exploited, the scope of the vulnerability,
impact it has brought and how it has been mitigated to prevent the attacker from exploiting the
systems.
Document Page
7
References
Bull, R. L., & Matthews, J. N. (2014). Exploring layer 2 network security in virtualized
environments. Retrieved Oct, 19, 2014.
Casula, R., 2014. “Shellshock” Security Vulnerability.
Delamore, B. and Ko, R.K., 2015, August. A global, empirical analysis of the shellshock
vulnerability in web applications. In Trustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 1129-
1135). IEEE.
Delamore, B., 2014. An Extensible Web Application Vulnerability Assessment and Testing
Framework (Doctoral dissertation, University of Waikato).
Huang, C., Liu, J., Fang, Y. and Zuo, Z., 2016. A study on Web security incidents in China by
analyzing vulnerability disclosure platforms. Computers & Security, 58, pp.47-62.
Mary, A., 2015. Shellshock Attack on Linux Systems-Bash. International Research Journal of
Engineering and Technology, 2(8), pp.1322-1325.
Muscat, I., 2016. Web vulnerabilities: identifying patterns and remedies. Network Security,
2016(2), pp.5-10.
Pieczul, O. and Foley, S.N., 2016, July. Runtime detection of zero-day vulnerability exploits in
contemporary software systems. In IFIP Annual Conference on Data and Applications Security
and Privacy (pp. 347-363). Springer International Publishing.
Yamaguchi, F., Maier, A., Gascon, H. and Rieck, K., 2015, May. Automatic inference of search
patterns for taint-style vulnerabilities. In Security and Privacy (SP), 2015 IEEE Symposium on
(pp. 797-812). IEEE.
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]