October 29, 2014 By Chris Poulin 3 min read

Similarities Between Shellshock and Heartbleed

With the fog of the Bash Shellshock exploit still clouding our eyeglasses, it is easy to lose sight of the Heartbleed OpenSSL vulnerability, which isn’t that long past and not entirely behind us. At IBM’s Insight conference in Las Vegas, I will be diving into the latest IBM’s X-Force Threat Intelligence Quarterly, in which we analyzed Heartbleed and tracked exploitations by cybercriminals.

The following are some of the striking similarities between Shellshock and Heartbleed:

  • Both bugs have been around for years. Heartbleed has been around for over two years, while Shellshock has been on the scene for 20.
  • Both are relatively easy to exploit. Neither require return-oriented programming or subverting memory protection schemes such as data execution prevention or address space layout randomization. In the case of Heartbleed, all an attacker has to do is send a heartbeat request asking for a larger response packet than is sent in the original request. The devil’s in the details, and fully functional exploits can’t use the OpenSSL library. This requires attackers to write their own SSL negotiation routines, but there was plenty of source material to draw from on GitHub. Shellshock is even easier to exploit, only requiring wget, curl, Tamper Data or similar utilities, or basic expertise with scripting languages such as Perl, Python and Ruby.
  • Both were weaponized almost as soon as they were disclosed. IBM X-Force was tracking full exploit attempts on Day 1 and prototype exploits on the day of the vulnerability announcement.
  • Both can exploit a broad threat surface but are mainly targeting Web services. Heartbleed can exploit any application that uses transport layer security and has been used to compromise at least one virtual private network gateway in a major attack and can even compromise client devices. However, the majority of attacks seek to scrape account credentials from the memory of Web services, and even the website’s certificate’s private key. Shellshock exploits a bug in the bash shell, included with most Linux distributions. However, in order to exploit the vulnerability, attackers must have a way of launching or accessing a shell instance. For a remote attacker, the low-hanging fruit is the HTTP request. The headers may be converted to environment variables by calling a bash subshell, where anything goes — albeit under the (hopefully restricted) permissions granted to the Web service — including remote interactive shell access. By no means are either Heartbleed or Shellshock restricted to exploiting Web servers, though.

IBM’s X-Force is seeing continued activity trying to exploit both vulnerabilities. Even months after the disclosure of Heartbleed, and after the initial exploitation frenzy, we still see a continued campaign against vulnerable systems. There is always a long tail after a vulnerability is disclosed, and organizations with more mature patching programs identify vulnerable systems and take remedial action, but there are always stragglers who are either slow to patch or don’t have an accurate asset inventory to identify systems that may be vulnerable. We expect to see the same long tail with Shellshock.

However, what keeps me up at night is the distraction of headline-grabbing vulnerabilities such as Heartbleed and Shellshock. They distract from fixing the easy vulnerabilities that have been around for years. I’m talking about SQL injection, cross-site scripting (XSS) and cross-site request forgery (XSRF). To avoid SQL injection, just use parameterized database queries such as stored procedures; XSS/XSRF is a matter of input sanitization. We also continue to fall victim to vulnerabilities in content management systems, especially their third-party plug-ins.

We’ve known about SQL infections and their solution for well over a decade. That’s a really long tail, and yet it is still in the top exploited vulnerabilities. Given that we can’t seem to eradicate simple vulnerabilities like SQL infections, how long will it take before we can close the case file on Heartbleed and Shellshock?

Download the latest research from IBM X-Force

More from Threat Intelligence

IBM identifies zero-day vulnerability in Zyxel NAS devices

12 min read - While investigating CVE-2023-27992, a vulnerability affecting Zyxel network-attached storage (NAS) devices, the IBM X-Force uncovered two new flaws, which when used together, allow for pre-authenticated remote code execution. Zyxel NAS devices are typically used by consumers as cloud storage devices for homes or small to medium-sized businesses. When used together, the flaws X-Force discovered allow a remote attacker to execute arbitrary code on the device with superuser permissions and without requiring any credentials. This results in complete control over the…

Stealthy WailingCrab Malware misuses MQTT Messaging Protocol

14 min read - This article was made possible thanks to the hard work of writer Charlotte Hammond and contributions from Ole Villadsen and Kat Metrick. IBM X-Force researchers have been tracking developments to the WailingCrab malware family, in particular, those relating to its C2 communication mechanisms, which include misusing the Internet-of-Things (IoT) messaging protocol MQTT. WailingCrab, also known as WikiLoader, is a sophisticated, multi-component malware delivered almost exclusively by an initial access broker that X-Force tracks as Hive0133, which overlaps with TA544. WailingCrab…

GootBot – Gootloader’s new approach to post-exploitation

8 min read - IBM X-Force discovered a new variant of Gootloader — the "GootBot" implant — which facilitates stealthy lateral movement and makes detection and blocking of Gootloader campaigns more difficult within enterprise environments. X-Force observed these campaigns leveraging SEO poisoning, wagering on unsuspecting victims' search activity, which we analyze further in the blog. The Gootloader group’s introduction of their own custom bot into the late stages of their attack chain is an attempt to avoid detections when using off-the-shelf tools for C2…

Hive0051’s large scale malicious operations enabled by synchronized multi-channel DNS fluxing

12 min read - For the last year and a half, IBM X-Force has actively monitored the evolution of Hive0051’s malware capabilities. This Russian threat actor has accelerated its development efforts to support expanding operations since the onset of the Ukraine conflict. Recent analysis identified three key changes to capabilities: an improved multi-channel approach to DNS fluxing, obfuscated multi-stage scripts, and the use of fileless PowerShell variants of the Gamma malware. As of October 2023, IBM X-Force has also observed a significant increase in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today