Apple has released a patch designed to neutralise the gaping vulnerability known as "Shellshock", an exploit in many Unix-based computers' shells that allows even inexperienced attackers to gain complete access using only 3 lines of code.
"The vast majority of OS X users are not at risk to recently reported bash vulnerabilities," an Apple spokesperson told ITProPortal earlier this week.
Read more: Shellshock: How to protect yourself
"Bash, a UNIX command shell and language included in OS X, has a weakness that could allow unauthorized users to remotely gain control of vulnerable systems. With OS X, systems are safe by default and not exposed to remote exploits of bash unless users configure advanced UNIX services. We are working to quickly provide a software update for our advanced UNIX users."
However, anyone who worries that they or their business might be vulnerable should take steps to update their systems now. The updates haven't yet made their way onto Apple's automated update tool, but the individual links for the updates are here: for Mavericks, for Lion, and for Mountain Lion. For more information on the latest patch and what it contains, check outApple's support page.
Shellshock hit the headlines yesterday with many security researchers, including Darien Kindlund from FireEye, stating that “it’s worse than Heartbleed” and Robert Graham adding that some systems won’t be able to be patched to prevent damage.
Unfortunately, the bug is pretty ubiquitous, and as such a large per cent of software across the web is constantly interacting with the shell, meaning there are a number of different ways it can infiltrate software.
Regular users of OS X don’t have any real need to panic and Apple has been at pains to point out that its advanced users that have configured UNIX services that are mainly at risk and may need to turn off services or apply home-made patches using Xcode.
For the full rundown on how to protect your machines from the Bash big, check out ITProPortal.com guide on the measure that can be taken.