Ghost bug. Glibc buffer overflow. Maybe another hartbleeding. Go fix your system now.

Posted On // Leave a Comment

A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.


Read more details:


http://ift.tt/1DdMzyx


http://ift.tt/1D3fUve


RedHat: http://ift.tt/1CvHfIe


Ubuntu: http://ift.tt/1p550Rx


Debian: http://ift.tt/15ISy2R


GNU C Library: http://ift.tt/P4wwJH


Solution:


RHEL/CentOS : sudo yum update glibc


Ubuntu : sudo apt-get update ; sudo apt-get install libc6


http://ift.tt/1dvHQ0Z

0 comments:

Post a Comment