Dave
01-28-2015, 09:09 AM
http://arstechnica.com/security/2015/01/highly-critical-ghost-allowing-code-execution-affects-most-linux-systems/
http://www.zdnet.com/article/critical-linux-security-hole-found/
Basically this bug makes it possible to remotely gain access to a Linux server by exploiting this bug, although a service needs to be running on the server which uses the function that contains the bug, you never know what service/software uses this.
You can test if you're vulnerable with this http://security.stackexchange.com/a/80213
Be sure to patch your VPS/dedicated server. How to patch. (http://www.cyberciti.biz/faq/cve-2015-0235-patch-ghost-on-debian-ubuntu-fedora-centos-rhel-linux/)
In case you use shared hosting, inform your host and ask them if they patched it or if they can patch it asap.
http://www.zdnet.com/article/critical-linux-security-hole-found/
Basically this bug makes it possible to remotely gain access to a Linux server by exploiting this bug, although a service needs to be running on the server which uses the function that contains the bug, you never know what service/software uses this.
You can test if you're vulnerable with this http://security.stackexchange.com/a/80213
Be sure to patch your VPS/dedicated server. How to patch. (http://www.cyberciti.biz/faq/cve-2015-0235-patch-ghost-on-debian-ubuntu-fedora-centos-rhel-linux/)
In case you use shared hosting, inform your host and ask them if they patched it or if they can patch it asap.