Skip to main content

Apple says most users are safe from Bash flaw

apple says users safe bash
Image used with permission by copyright holder
There’s been a lot of uncertainty around the Bash flaw (or Shellshock bug) that was uncovered this week, with Linux and OS X systems thought to be particularly vulnerable. Apple has released a statement saying there’s no need to panic: Most users should be safe from harm, with no patches necessary.

“The vast majority of OS X users are not at risk to recently reported Bash vulnerabilities,” said Apple in a statement emailed to various press outlets. “Bash, a UNIX command shell and language included in OS X, has a weakness that could allow unauthorized users to remotely gain control of vulnerable systems. With OS X, systems are safe by default and not exposed to remote exploits of Bash unless users configure advanced UNIX services. We are working to quickly provide a software update for our advanced UNIX users.”

If you are one of the “advanced UNIX users” that Apple refers to then the safest course of action is to disable the services in question until the company is able to get an update out, though Apple hasn’t been specific in saying which services are affected. What makes Shellshock so dangerous is that it’s been present in every UNIX system since way back in 1989, so there are a lot of potentially exposed systems out there.

As a result the National Vulnerability Database rated the severity of the problem at “10.0 HIGH” earlier in the week. For the average user, there’s not much you can do except wait for the necessary patches to appear; if you run a website or server then you might have a problem. We’ve put together a straightforward guide to checking if your site is under threat.

Editors' Recommendations

Topics
David Nield
Dave is a freelance journalist from Manchester in the north-west of England. He's been writing about technology since the…
Researchers find a scary data vulnerability in Apple’s AirDrop
AirDrop options on an iPhone.

Hackers can tap into AirDrop data and pull your phone number or your email address. This issue has been known since 2019 and has yet to be patched or acknowledged by Apple, though it impacts almost 1.5 billion Apple devices today.

According to a report from security researchers at Germany's Technical University of Darmstadt, the core of this issue is the way in which AirDrop shares files between Apple devices using the address book and contacts list as an option by default. Per the researchers, since AirDrop leverages "a mutual authentication mechanism," to compare phone numbers, as well as email addresses, a hacker can easily intercept this information using "a Wi-Fi-capable device" that is nearby to an Apple user sharing through MacOS, iOS, or iPadOS via AirDrop. A proof of concept attack can be found on GitHub.

Read more
What Microsoft can learn from Apple’s Mac on ARM transition
Apple MacOS Big Sur design

Microsoft has tried to transition toward ARM chips multiple times in the past 10 years. All of them have been failed attempts.

But at Worldwide Developers Conference on Monday, Apple announced its own plans to switch away from using Intel processors to its own custom ARM-based chips, starting later this year. But in Apple's case, it just might work.

Read more
Apple says Mac Catalyst is working. We asked developers to find out the truth
tim-cook-apple-wwdc-2018-getty

Apple's Mac Catalyst project seems harmless enough. It provides a simple way for iOS developers to bring their apps to the Mac -- a win-win scenario for both developers and Apple, right?

Well, yes. But if you're judging by history, the stakes are high. Bridging the gap between the worlds of mobile and desktop appears a Herculean task given their different goals, problems, and support issues. Microsoft has failed at the transition multiple times, and Apple itself has steered clear of the attempt for many years.

Read more