Linux admins, get patching. New vulnerability found in Glibc
Discussion
This is quite a bad one.
Qualys Security Advisory CVE-2015-0235
GHOST: glibc gethostbyname buffer overflow
Qualys Security Advisory CVE-2015-0235
GHOST: glibc gethostbyname buffer overflow
cornet said:
Is that all...
We've patched 120+ servers today... Don't forget to restart any services that use gethostbyname()
exim seems the only common one that is remotely exploitable from what I've been reading. Apache, mysql/maria etc appear in the clear.We've patched 120+ servers today... Don't forget to restart any services that use gethostbyname()
Qualys seem to have done an awful lot of work on this before it was made public on Tuesday, the advisory was an impressive piece of work.
Gassing Station | Computers, Gadgets & Stuff | Top of Page | What's New | My Stuff