It is a vulnerability in GNUs bash shell, discovered in September of 2014, that gives attackers access to run remote commands on a vulnerable system. The malicious software can take control of an infected machine, launch denial-of-servic
e attacks to disrupt websites, and scan for other vulnerable devices (including routers).
Which of the following vulnerabilities is being described?
A. Shellshock
B. Rootshock
C. Rootshell
D. Shellbash
Shellshock, also known as Bashdoor, is a
family of security bugs in the widely used Unix Bash shell, the first of which was disclosed on 24 September 2014.
References: