Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q18123513> ?p ?o }
Showing triples 1 to 89 of
89
with 100 triples per page.
- Q18123513 subject Q15308497.
- Q18123513 subject Q6812727.
- Q18123513 subject Q8549428.
- Q18123513 subject Q8551730.
- Q18123513 abstract "Shellshock, also known as Bashdoor, is a family of security bugs in the widely used Unix Bash shell, the first of which was disclosed on 24 September 2014. Many Internet-facing services, such as some web server deployments, use Bash to process certain requests, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands. This can allow an attacker to gain unauthorized access to a computer system.Stéphane Chazelas contacted Bash's maintainer, Chet Ramey, on 12 September 2014 telling Ramey about his discovery of the original bug, which he called "Bashdoor". Working together with security experts, he soon had a patch as well. The bug was assigned the CVE identifier CVE-2014-6271. It was announced to the public on 24 September 2014 when Bash updates with the fix were ready for distribution.The first bug causes Bash to unintentionally execute commands when the commands are concatenated to the end of function definitions stored in the values of environment variables. Within days of the publication of this, intense scrutiny of the underlying design flaws discovered a variety of related vulnerabilities, (CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187); which Ramey addressed with a series of further patches.Attackers exploited Shellshock within hours of the initial disclosure by creating botnets of compromised computers to perform distributed denial-of-service attacks and vulnerability scanning. Security companies recorded millions of attacks and probes related to the bug in the days following the disclosure.Shellshock could potentially compromise millions of unpatched servers and other systems. Accordingly, it has been compared to the Heartbleed bug in its severity.Apple Inc. commented that OS X systems are safe by default, unless users configure advanced UNIX services. Such advanced users are typically capable of turning the services off until an official OS X patch is available, or they may use Xcode to replace system-provided Bash with a custom-compiled version that incorporates unofficial patches. Although notified of the vulnerability before it was made public, the company did not release a corresponding OS X update until 29 September 2014, at which time the OS X bash Update 1.0 was released.".
- Q18123513 wikiPageExternalLink home.cfm.
- Q18123513 wikiPageExternalLink cvename.cgi?name=CVE-2014-6278.
- Q18123513 wikiPageExternalLink detail?vulnId=CVE-2014-6277.
- Q18123513 wikiPageExternalLink detail?vulnId=CVE-2014-6278.
- Q18123513 wikiPageExternalLink detail?vulnId=CVE-2014-7186.
- Q18123513 wikiPageExternalLink detail?vulnId=CVE-2014-7187.
- Q18123513 wikiPageExternalLink cve.mitre.org.
- Q18123513 wikiPageExternalLink search.do?language=en_US&cmd=displayKC&externalId=2090740.
- Q18123513 wikiPageExternalLink system.
- Q18123513 wikiPageExternalLink alert-cve-2014-7169-2303276.html.
- Q18123513 wikiPageExternalLink cvename.cgi?name=CVE-2014-6271.
- Q18123513 wikiPageExternalLink cvename.cgi?name=CVE-2014-6277.
- Q18123513 wikiPageExternalLink cvename.cgi?name=CVE-2014-7169.
- Q18123513 wikiPageExternalLink cvename.cgi?name=CVE-2014-7186.
- Q18123513 wikiPageExternalLink cvename.cgi?name=CVE-2014-7187.
- Q18123513 wikiPageExternalLink bash.
- Q18123513 wikiPageExternalLink 18725.
- Q18123513 wikiPageExternalLink detail?vulnId=CVE-2014-6271.
- Q18123513 wikiPageExternalLink detail?vulnId=CVE-2014-7169.
- Q18123513 wikiPageExternalLink shellshock-in-the-wild.html.
- Q18123513 wikiPageWikiLink Q10513863.
- Q18123513 wikiPageWikiLink Q1062340.
- Q18123513 wikiPageWikiLink Q11166.
- Q18123513 wikiPageWikiLink Q11209.
- Q18123513 wikiPageWikiLink Q11288.
- Q18123513 wikiPageWikiLink Q11354.
- Q18123513 wikiPageWikiLink Q11368.
- Q18123513 wikiPageWikiLink Q11407.
- Q18123513 wikiPageWikiLink Q1189053.
- Q18123513 wikiPageWikiLink Q128751.
- Q18123513 wikiPageWikiLink Q131406.
- Q18123513 wikiPageWikiLink Q1362142.
- Q18123513 wikiPageWikiLink Q14116.
- Q18123513 wikiPageWikiLink Q1439356.
- Q18123513 wikiPageWikiLink Q15308497.
- Q18123513 wikiPageWikiLink Q16244272.
- Q18123513 wikiPageWikiLink Q176691.
- Q18123513 wikiPageWikiLink Q18109.
- Q18123513 wikiPageWikiLink Q189053.
- Q18123513 wikiPageWikiLink Q189248.
- Q18123513 wikiPageWikiLink Q190686.
- Q18123513 wikiPageWikiLink Q19423.
- Q18123513 wikiPageWikiLink Q19900.
- Q18123513 wikiPageWikiLink Q208218.
- Q18123513 wikiPageWikiLink Q215273.
- Q18123513 wikiPageWikiLink Q21605402.
- Q18123513 wikiPageWikiLink Q2299491.
- Q18123513 wikiPageWikiLink Q250328.
- Q18123513 wikiPageWikiLink Q264364.
- Q18123513 wikiPageWikiLink Q283770.
- Q18123513 wikiPageWikiLink Q284108.
- Q18123513 wikiPageWikiLink Q2924892.
- Q18123513 wikiPageWikiLink Q312.
- Q18123513 wikiPageWikiLink Q317671.
- Q18123513 wikiPageWikiLink Q341.
- Q18123513 wikiPageWikiLink Q353346.
- Q18123513 wikiPageWikiLink Q37093.
- Q18123513 wikiPageWikiLink Q381.
- Q18123513 wikiPageWikiLink Q39064.
- Q18123513 wikiPageWikiLink Q400857.
- Q18123513 wikiPageWikiLink Q415598.
- Q18123513 wikiPageWikiLink Q429930.
- Q18123513 wikiPageWikiLink Q47506.
- Q18123513 wikiPageWikiLink Q4778915.
- Q18123513 wikiPageWikiLink Q48267.
- Q18123513 wikiPageWikiLink Q485593.
- Q18123513 wikiPageWikiLink Q489943.
- Q18123513 wikiPageWikiLink Q535052.
- Q18123513 wikiPageWikiLink Q5451274.
- Q18123513 wikiPageWikiLink Q5968842.
- Q18123513 wikiPageWikiLink Q6014136.
- Q18123513 wikiPageWikiLink Q615582.
- Q18123513 wikiPageWikiLink Q627226.
- Q18123513 wikiPageWikiLink Q6812727.
- Q18123513 wikiPageWikiLink Q7316308.
- Q18123513 wikiPageWikiLink Q7445023.
- Q18123513 wikiPageWikiLink Q7598.
- Q18123513 wikiPageWikiLink Q778586.
- Q18123513 wikiPageWikiLink Q847062.
- Q18123513 wikiPageWikiLink Q8549428.
- Q18123513 wikiPageWikiLink Q8551730.
- Q18123513 wikiPageWikiLink Q95.
- Q18123513 comment "Shellshock, also known as Bashdoor, is a family of security bugs in the widely used Unix Bash shell, the first of which was disclosed on 24 September 2014. Many Internet-facing services, such as some web server deployments, use Bash to process certain requests, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands.".
- Q18123513 label "Shellshock (software bug)".