![]() |
GHOST bug/exploit in Linux - Critical
http://arstechnica.com/security/2015...linux-systems/
http://www.zdnet.com/article/critica...ty-hole-found/ Basically this bug makes it possible to remotely gain access to a Linux server by exploiting this bug, although a service needs to be running on the server which uses the function that contains the bug, you never know what service/software uses this. You can test if you're vulnerable with this http://security.stackexchange.com/a/80213 Be sure to patch your VPS/dedicated server. How to patch. In case you use shared hosting, inform your host and ask them if they patched it or if they can patch it asap. |
This info should be somehow more prominent..
|
I had actually asked my host about this the other day and had patched my site. But, they didn't tell me to do a reboot. I just now ran the test and it said I wasn't vulnerable. Then I checked to see if there were any dynamically linked programs still using the old version of glibc and I got a list of about 15 items. So, I rebooted and now I don't get any programs listed.
Anyway, thank you for posted that! |
Thanks for the heads up, Lynne. Hadn?t rebooted until I read your post :D
|
Not vulnerable here :)
|
Oh what fun ...... all my servers now patched.
|
i contacted my webhost and they said that their hardware was the best and that if you have good hardware your os is secure. What lies...
|
Time to get a new host. :)
|
Can someone explain how does one run this a step by step would be helpful
|
|
All times are GMT. The time now is 03:27 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|