January 27, 2015, a vulnerability in the GNU C library (GLIBC) is also known as Ghost Shadow Vulnerability (ghost). Overall, this vulnerability allows a remote attacker to take advantage of the buffer overflow vulnerability of the GetHost function in glibc to gain complete control of the system. Click here for more details.
Ghost exploits can be exploited on Linux systems prior to the glibc-2.18 version. In other words, versions 2.2 to 2.17 that have not been patched are risky.
650) this.width=650; "src=" http://img.linux.net.cn/data/attachment/album/201503/26/150802cavgbdgbdbm9eq8b.jpg "/ >
Check for system vulnerabilities
You can use the following command to check the version of GLib
LDD--version
Output
LDD (Ubuntu GLIBC 2.19-10ubuntu2) 2.19 Copyright (C) Free Software Foundation, Inc. This was free software; See the source for copying conditions. There is NO warranty; Not even to merchantability or FITNESS for A particular PURPOSE. Written by Roland McGrath and Ulrich drepper.
The version of glib should be above 2.17 and our output is 2.19. If you see the version of glib between 2.2 and 2.17. You should run the following command.
sudo apt-get update
sudo apt-get dist-upgrade
After installation, you should restart the system with the following command.
sudo reboot
After the reboot is complete, you can use the same command to check the glib version.
Via:http://www.ubuntugeek.com/how-to-protect-ubuntu-server-against-the-ghost-vulnerability.html
How to get Ubuntu server away from Ghost Shadow Vulnerability (ghost) impact