28 jan

[Global] Announcement: Linux ghost remote code execution vulnerability [Update]

Time: January 28, 2015 16:00:00 (CET)
Dear LeaseWeb customer,

On January 27, 2015, a GNU C Library (glibc) vulnerability, referred to as the GHOST vulnerability, was announced to the general public. In summary, the vulnerability allows remote attackers to take complete control of a system by exploiting a buffer overflow bug in glibc's GetHOST functions (hence the name). Like Shellshock and Heartbleed, this vulnerability is serious and affects many servers.

Source: http://seclists.org/oss-sec/2015/q1/274

Please do the following to check if your system is affected;

Ubuntu & Debian:
Check the version glibc by looking up the version of ldd (which uses glibc) like this:
ldd –version

If the version of eglibc matches, or is more recent than, the ones listed here, you are safe from the GHOST vulnerability:

• Ubuntu 12.04 LTS: 2.15-0ubuntu10.10
• Ubuntu 10.04 LTS: 2.11.1-0ubuntu7.20
• Debian 7 LTS: 2.13-38+deb7u7

CentOS & RHEL:
If the version of glibc is older than 2.12-1.149.5, your system is vulnerable to GHOST and should be updated. If you are using 2.12-1.149.5 or later, you are safe from the vulnerability.

Fix:
Update glibc (either apt-get update && apt-get dist-upgrade or yum update glibc).

Trusting to have informed you sufficiently,