Unconfigured Ad Widget

Collapse

glibc vulnerability aka Ghost

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • ocabj
    Calguns Addict
    • Oct 2005
    • 7924

    glibc vulnerability aka Ghost

    I hope all of you are updating glibc packages or recompiling to mitigate the getbyhostname() vulnerability.

    Buffer overflow has been confirmed by Qualys.


    Distinguished Rifleman #1924
    NRA Certified Instructor (Rifle and Metallic Cartridge Reloading) and RSO
    NRL22 Match Director at WEGC

    https://www.ocabj.net
  • #2
    deebix
    Senior Member
    • Apr 2008
    • 737

    Working in this industry I can appreciate the heads up, however, maybe you should give a little bit more of what and why for noobs and novice devs. thx

    Comment

    • #3
      ocabj
      Calguns Addict
      • Oct 2005
      • 7924

      Originally posted by deebix
      Working in this industry I can appreciate the heads up, however, maybe you should give a little bit more of what and why for noobs and novice devs. thx
      There's a complete code walkthrough in that URL.

      I think it's pretty obvious the ramifications that a vulnerability in a linked library will have on a system to anyone in IT, especially one like this that hinges on a (albeit deprecated) name to IP address resolution function.

      Distinguished Rifleman #1924
      NRA Certified Instructor (Rifle and Metallic Cartridge Reloading) and RSO
      NRL22 Match Director at WEGC

      https://www.ocabj.net

      Comment

      Working...
      UA-8071174-1