*nix exploits are nothing new. Indeed, I feel reasonably confident in saying that the first ever malicious buffer overrun exploit was engineered on the Unix 'finger' command, nearly 30 years ago.
What *nix has traditionally offered is a safety net, thanks to the user privilege mechanism. As long as you are logged in as a non privileged user', anybody exploiting your session is very restricted in the damage they can do to the system, even if they can wreak havoc with your own personal files.
However, web servers are a different matter. If the web server daemon process can be tricked into revealing (say) the banking details of other customers then that's a pretty good result for the bad guys, even if the server survives in other respects.
My own biggest nightmare - not just with this exploit, but with *nix exploits in general, is probably an attack not on web servers, but on telecoms servers, which are also often Linux based these days. Since deregulation, every time you make a land line phone call, or register a mobile with a base station, or your CP exchanges billing details with another CP, odds on a Linux server has a finger in the pie...