1 / 1

Understanding GHOST Vulnerability

Centextech
Download Presentation

Understanding GHOST Vulnerability

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Understanding GHOST Vulnerability GHOST vulnerability is a bug that could potentially allow a buffer overflow in Linux systems. Which Systems Are Affected? Debian 7 (Wheezy) Enterprise Linux 5/6/7 Centos 6/7 Ubuntu 12.04 Glibc Versions From 2.2 To 2.18 Some Facts About GHOST It affects 'gethostbyname' and 'gethostbyname2' functions in Linux GNU C library. It allows attackers to gain remote control of the system via a buffer overflow. In order to check if you are affected, check system logs for abnormal program terminations. If affected, apply 'glibac patches' on the system. www.centextech.com Centex Technologies 1201 Peachtree St NE, Suite 200, Atlanta, GA 30361 7600 Chevy Chase Drive, Suite 300, Austin, TX 78752 13355 Noel Road, Suite # 1100, Dallas, TX 75240 501 N. 4th Street, Killeen, TX 76541 Phone: (404) 994 - 5074 Phone: (512) 956 - 5454 Phone: (972) 375 - 9654 Phone: (254) 213 - 4740 Image Source: Designed by Freepik

More Related