What is the GHOST vulnerability
The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials. CVE-2015-0235 has been assigned to this issue.
Qualys security researchers discovered this bug and worked closely with Linux distribution vendors. And as a result of that we are releasing this advisory today as a co-ordinated effort, and patches for all distribution are available January 27, 2015.
Am i affected?
The best way to find out for sure is to run this quick check through the blog link shown below
Information on how to test and patch
How can i get help to check or patch?
If you are our customer, write to support and we can schedule a fix time and date. In the meantime, we suggest to keep abreast of latest development of this vulnerability via online security channels.
More reading: https://community. qualys.com/blogs/laws-of- vulnerabilities/2015/01/27/ the-ghost-vulnerability
DISCLAIMER:
- The above steps and steps mentioned in our blogs are purely for educational purposes only. They are not meant to replace mainstream advisories.
- Use at your own risk
- The guides are put together from other online resources found on the general internet. We do not claim copyright nor proprietor rights on the article or advisories