28 jan

[Global] Announcement: Linux ghost remote code execution vulnerability [Update]

Time: January 28, 2015 16:00:00 (CET)
Dear LeaseWeb customer,

On January 27, 2015, a GNU C Library (glibc) vulnerability, referred to as the GHOST vulnerability, was announced to the general public. In summary, the vulnerability allows remote attackers to take complete control of a system by exploiting a buffer overflow bug in glibc's GetHOST functions (hence the name). Like Shellshock and Heartbleed, this vulnerability is serious and affects many servers.

Source: http://seclists.org/oss-sec/2015/q1/274

Please do the following to check if your system is affected;

Ubuntu & Debian:
Check the version glibc by looking up the version of ldd (which uses glibc) like this:
ldd –version

If the version of eglibc matches, or is more recent than, the ones listed here, you are safe from the GHOST vulnerability:

• Ubuntu 12.04 LTS: 2.15-0ubuntu10.10
• Ubuntu 10.04 LTS: 2.11.1-0ubuntu7.20
• Debian 7 LTS: 2.13-38+deb7u7

CentOS & RHEL:
If the version of glibc is older than 2.12-1.149.5, your system is vulnerable to GHOST and should be updated. If you are using 2.12-1.149.5 or later, you are safe from the vulnerability.

Fix:
Update glibc (either apt-get update && apt-get dist-upgrade or yum update glibc).

Trusting to have informed you sufficiently,

storingsoverzicht-logo
Privacyoverzicht

Deze site maakt gebruik van cookies, zodat wij je de best mogelijke gebruikerservaring kunnen bieden. Cookie-informatie wordt opgeslagen in je browser en voert functies uit zoals het herkennen wanneer je terugkeert naar onze site en helpt ons team om te begrijpen welke delen van de site je het meest interessant en nuttig vindt.