How to keep Ubuntu servers away from the influence of the GHOST Vulnerability (GHOST)

Source: Internet
Author: User

How to keep Ubuntu servers away from the influence of the GHOST Vulnerability (GHOST)

On July 6, January 27, 2015, a vulnerability in the gnu c library (glibc), also known as the GHOST Vulnerability (GHOST), was published. In general, this vulnerability allows remote attackers to exploit the buffer overflow vulnerability of the GetHOST function in glibc to gain full control of the system. Click here for more details.

Ghost vulnerabilities can be exploited on Linux systems prior to glibc-2.18. That is to say, any version that has not been patched, from 2.2 to 2.17, is risky.

 

Check System Vulnerabilities

You can use the following command to check the glib version.

  1. ldd --version

 

Output

Ldd (Ubuntu GLIBC 2.19-10ubuntu2) 2.19 Copyright (C) 2014 Free Software Foundation, Inc. this is free software; see the source for copying conditions. there is NO warranty; not even for MERCHANTABILITY or fitness for a participant PURPOSE. written by Roland McGrath and Ulrich Drepper.

The glib version should be higher than 2.17, and our output is 2.19. If you see that the glib version is between 2.2 and 2.17. You should run the following command.

  1. sudo apt-get update
  2. sudo apt-get dist-upgrade

After installation, run the following command to restart the system.

  1. sudo reboot

After the restart, you can use the same command to check the glib version.

Dangerous! GHOST (GHOST) vulnerability exposure

GNU glibc gethostbyname Buffer Overflow Vulnerability

Glibc gethostbyname Buffer Overflow Vulnerability (CVE-2015-0235)

Linux glibc ghost vulnerability test and repair methods

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.