GHOST: glibc gethostbyname buffer overflow
-
A major security vulnerability was released for glibc today
-
Oh man, glibc is pretty ubiquitous.
-
I suspect that this will be patched in no time, though. A lot of eyes on glibc.
-
Redhat seems like they have it patched for only 5! Still checking on possible patches but more worried about breaking something!
-
@ambarishrh said:
Redhat seems like they have it patched for only 5! Still checking on possible patches but more worried about breaking something!
They are likely going version by version.
-
Hope to get for version 6 as well. Meantime I got Lynis enterprise for our servers! Currently working on installing it on all servers and doing a complete audit, just to make sure nothing slipped of.
-
cPanel has posted the following article regarding this vulernability.
http://documentation.cpanel.net/display/CKB/CVE-2015-0235+GHOST
You can check if your server is affected by running the following command. If this was patched it should show a line in the output which indicates it was patched.
rpm -q --changelog glibc | grep CVE-2015-0235
Fix mentioned is to do an yum upgrade which updates glibc, but doesnt seems like CentOS has this yet
-
Looks like the scope of affected apps may be smaller than originally anticipated:
-
Good deal.
-
PHP and WordPress found to be vulnerable.
http://threatpost.com/php-applications-wordpress-subject-to-ghost-glibc-vulnerability/110755
-
@Reid-Cooper wonderful