Which of the following vulnerabilities is being described?

It is a vulnerability in GNU’s bash shell, discovered in September of 2014, that gives attackers access to run
remote commands on a vulnerable system. The malicious software can take control of an infected machine,
launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers).
Which of the following vulnerabilities is being described?

It is a vulnerability in GNU’s bash shell, discovered in September of 2014, that gives attackers access to run
remote commands on a vulnerable system. The malicious software can take control of an infected machine,
launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers).
Which of the following vulnerabilities is being described?

A.
Shellshock

B.
Rootshock

C.
Rootshell

D.
Shellbash

Explanation:
Shellshock, also known as Bashdoor, is a family of security bugs in the widely used Unix Bash shell, the first of
which was disclosed on 24 September 2014.
https://en.wikipedia.org/wiki/Shellshock_(software_bug)



Leave a Reply 0

Your email address will not be published. Required fields are marked *