How to keep Ubuntu servers away from the influence of the GHOST Vulnerability (GHOST)
On July 6, January 27, 2015, a vulnerability in the gnu c library (glibc), also known as the GHOST Vulnerability (GHOST), was published. In general, this vulnerability allows remote attackers to exploit the buffer overflow vulnerability of the GetHOST function in glibc to gain full control of the system. Click here for more details.
Ghost vulnerabilities can be exploited on Linux systems prior to glibc-2.18. That is to say, any version that has not been patched, from 2.2 to 2.17, is risky.
Check System Vulnerabilities
You can use the following command to check the glib version.
ldd --version
Output
Ldd (Ubuntu GLIBC 2.19-10ubuntu2) 2.19 Copyright (C) 2014 Free Software Foundation, Inc. this is free software; see the source for copying conditions. there is NO warranty; not even for MERCHANTABILITY or fitness for a participant PURPOSE. written by Roland McGrath and Ulrich Drepper.
The glib version should be higher than 2.17, and our output is 2.19. If you see that the glib version is between 2.2 and 2.17. You should run the following command.
sudo apt-get update
sudo apt-get dist-upgrade
After installation, run the following command to restart the system.
sudo reboot
After the restart, you can use the same command to check the glib version.
Dangerous! GHOST (GHOST) vulnerability exposure
GNU glibc gethostbyname Buffer Overflow Vulnerability
Glibc gethostbyname Buffer Overflow Vulnerability (CVE-2015-0235)
Linux glibc ghost vulnerability test and repair methods