Posts

Showing posts with the label Ghost patch vulnerability

How To Patch and Protect Linux Server Against the Glibc GHOST Vulnerability # CVE-2015-0235

Image
A very serious security problem has been found in the GNU C Library (Glibc) called GHOST. How can I fix GHOST vulnerability and protect my Linux server against the attack? How do I verify that my server has been fixed against the Glibc GHOST vulnerability? A very serious security problem has been found and patched in the GNU C Library called Glibc. It was announced on 27th January 2015. What is the GHOST security bug? Tutorial details Difficulty Easy (rss) Root privileges Yes Requirements Linux + reboot required Estimated completion time 10m From the  RHEL bugzilla : A heap-based buffer overflow was found in __nss_hostname_digits_dots(), which is used by the gethostbyname() and gethostbyname2() glibc function call. A remote attacker could use this flaw to execute arbitary code with the permissions of the user running the application. A mailing list entry with more details, including in-depth analysis and exploit vectors is  here . What C library (Glibc) version does my Lin