Wednesday, January 28, 2015

US-CERT: Linux "Ghost" Remote Code Execution Vulnerability

From US-CERT:
Linux "Ghost" Remote Code Execution Vulnerability


"The Linux GNU C Library (glibc) versions prior to 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system. Linux distributions employing glibc-2.18 and later are not affected.

US-CERT recommends users and administrators refer to their respective Linux or Unix-based OS vendor(s) for an appropriate patch if affected. Patches are available from Ubuntu (link is external) and Red Hat (link is external). The GNU C Library versions 2.18 and later are also available for experienced users and administrators to implement."

No comments:

Post a Comment