Ghost Vulnerability

4 posts / 0 new
Last post
#1 Wed, 01/28/2015 - 22:46
andreychek

Ghost Vulnerability

Howdy,

As many of you may have heard, there is a vulnerability nicknamed "Ghost" in the glibc library, which allows attackers to perform remote code execution on an unpatched server.

If you haven't already, we highly recommend updating your system.

You can do that by running yum update on RHEL and CentOS, or apt-get update && apt-get upgrade on Ubuntu and Debian.

After performing those updates, we'd suggest you reboot your server, though alternatively you could technically restart all the processes on your server relying on glibc (which is likely most of them).

You can read more about this vulberability here:

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0235

Fri, 01/30/2015 - 15:38
amityweb

Thanks a lot. Great to know its patched in a simple yum update. All done my end :)

Sat, 01/31/2015 - 12:19
Welshman
Welshman's picture

Did you reboot or re start all processes regarding this update, if not the update is total vanity.

Chaos Reigns Within, Reflect, Repent and Reboot, Order Shall Return.

Mon, 02/02/2015 - 10:19
amityweb

Rebooted all servers.