GHOST glibc Security Vulnerability


 
Thread Tools Search this Thread
Top Forums UNIX for Advanced & Expert Users GHOST glibc Security Vulnerability
# 1  
Old 02-09-2015
RedHat GHOST glibc Security Vulnerability

Hello All,

Just FYI please about GHOST glibc Security Vulnerability(not sure if this is posted already) which may help us to secure our systems.
Following are the 2 links on same too from Redhat side.

https://access.redhat.com/articles/1333353
https://access.redhat.com/security/cve/CVE-2015-0235


Quote:
GHOST is a 'buffer overflow' bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. This vulnerability allows a remote attacker to execute arbitrary code with the permissions of the user running the application.

Thanks,
R. Singh
This User Gave Thanks to RavinderSingh13 For This Post:
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. UNIX and Linux Applications

Install glibc-debug for glibc-2.11.3-17.31.1 on SLES 11

I have to debug a function getopt_long in glibc-2.11.3-17.31.1. For that how can I download and install its corresponding glibc-debug on SLES 11? (8 Replies)
Discussion started by: rupeshkp728
8 Replies

2. Solaris

Security vulnerability on my sun solaris 9 box

We are running security scans on our machines. I am concerned with my solaris 9 box running on a 280r. got the following message. The remote host accepts loose source routed IP packets. The feature was designed for testing purpose. An attacker may use it to circumvent poorly designed IP... (1 Reply)
Discussion started by: BG_JrAdmin
1 Replies
Login or Register to Ask a Question