• Home
  • News
  • Fortune 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Cybersecurity

‘Bash’ security bug could be bigger than ‘Heartbleed’

By
John Kell
John Kell
Contributing Writer and author of CIO Intelligence
By
John Kell
John Kell
Contributing Writer and author of CIO Intelligence
September 25, 2014, 8:53 AM ET
Technology
contract armin harrisKyle Bean for Fortune

Cyber experts are warning that a security bug in a widely used piece of Linux software, known as “Bash,” could potentially pose a bigger threat to computer users than the “Heartbleed” bug that surfaced earlier this year.

The Department of Homeland Security’s Computer Emergency Readiness Team, known as US-CERT, issued a statement that it was “aware of a Bash vulnerability” affecting Unix-based operating systems such as Linux and Mac OS X. Security experts have told Reuters, CNET and other media outlets that the potential vulnerability is large, with some saying there is a wide range of devices affected that require system administrators to apply patches immediately.

That’s because Bash is “perhaps one of the most installed utilities on any Linux system,” according to a security blog post by open-source software provider Red Hat (RHT). Created in 1980, Bash has evolved from a terminal-based command interpreter to many other uses, Red Hat said, and it is common for a lot of programs to run Bash in the background.

Bash is the software used to control the command prompt on many Unix computers, according to a Reuters report. Citing security experts, Reuters reported hackers can exploit a bug in Bash to take complete control of a targeted system.

The worries surrounding Bash come after companies were forced to scramble to patch their systems after a vulnerability known as Heartbleed created a stir. The Heartbleed vulnerability was a weakness in the widely-used OpenSSL encryption that protects the electronic traffic on a large number of websites and in scores of devices, according to a Homeland Security statement in April. That vulnerability was unusual in that it was widespread, easy to use and the bug had reportedly been out for more than two years.

About the Author
By John KellContributing Writer and author of CIO Intelligence

John Kell is a contributing writer for Fortune and author of Fortune’s CIO Intelligence newsletter.

See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.