摘要
著名Shell软件Bash的"破壳"漏洞席卷全球,引起业内人士的全面关注。文章从该漏洞的披露过程出发,深入剖析漏洞的工作原理和可被利用的攻击方式。通过分析该漏洞所造成的影响,提出与漏洞处理的技术手段相比,漏洞处理的机制问题更值得反思。
“SheI shock”vuInerabiIity of Bash shocks the gIobaI network, and IT insiders focus on it aI over the worId. This thesis shows the discovery process of the vuInerabiIity, and deepIy anaIyses the work theory and at ack methods of it. After discussing the infIuence of the vuInerabiIity, it shows that the processing mechanism of vuInerabiIity is more important than the technicaI method.