Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

How to protect OSX against Shellshock bug?

Is there a patch out already to protect against the just discovered Shellshock bug (which exploits bash)?

Macbook Pro

Posted on Sep 25, 2014 6:38 AM

Reply
19 replies

Sep 25, 2014 10:12 AM in response to Kurt Lang

No they do NOT need to be at your computer. Read posted article it explains everything inside. It can be remotely done through a relatively simply process by someone NOT needing to be logged in. The ENV are set by the attacker without credentials. Its already been proven that PHP, Cups, Apache headers and the like CAN access this exploit. Numerous systems access or are designed around bash shell. The fact no credentials are required or essential root access is the big problem and it goes as far as to exposed routers and IoT devices that likely will never receive an update.

Sep 25, 2014 10:49 AM in response to Ubentobox

Per Linc Davis, a user here who knows more about Unix than pretty much anyone else here:

The issue only affects users who run a public server.

From your post:

my airport extreme just got hacked

And what does your router have to do with the issue? Router poisoning has been known to exist for a long time, which has absolutely nothing to do with Bash, or your Mac. It's a problem with routers being shipped with remote management enabled in its settings. Reset the router, then go into the settings and disable remote access.

Sep 25, 2014 11:05 AM in response to Graham.M

The truth is: yes you are technically vulnerable. But the reality is unless you allow SSH access from remote connections or a web server that runs server side scripting, you are not at risk. You are only truly vulnerable if someone you do not know can remotely access your machine & do so in a way where a Bash command can be executed.

So this issue is mainly of concern to system administrators on Mac OS X & Unix/Linux servers exposed to the world, not desktop users who do not enable SSH sharing.

Sep 25, 2014 1:22 PM in response to macadmin78

Yes, it especially needs to be expedited for Mac servers hosting outside connections. We use an iMac with Lion Server here for our small business, but all broadcasting is turned off. AFP access for internal connected Macs only.


Root is disabled by default in OS X. Any attempt by such a package to install items requiring access to the system should prompt the admin password box to appear. Any time that box appears out of nowhere, you should always cancel.

Sep 25, 2014 4:36 PM in response to Graham.M

This is a much larger issue, as the very excellent Troy Hunt article details. There are many vectors. Your router, is the first one. In my case pfsense is not vulnerable, but many other routers will be. Any external service running on *nix can be affected. If you run a webserver, you will have to take steps.


There may be other OS X vectors we don't yet know about, so, better to patch as soon as we can rather than waiting for a proven exploit.

How to protect OSX against Shellshock bug?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.