Linux “Ghost” Vulnerability

About Us

SysAdmins creating software for SysAdmins.

Linux “Ghost” Vulnerability

In case you are not already aware, there has been a Linux vulnerability discovered commonly known as “GHOST” which is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. Remote attackers can use this flaw to execute arbitrary code with the permissions of the user running the application. It could also perform an out-of-bounds array access, causing the process to crash and in some scenarios, this could allow a remote attacker to cause a persistent denial of servers.

Click here for more information about CVE-2015-0235

Get a backup before you patch!
For our current customers, you already know the benefits of having a full-system backup on hand in case of emergencies. If you are not already a customer, we recommend using our 30-day free trial to get your tier 1 systems backed up before you patch.