Hi folks,

Just in case you've not seen the latest remotely exploitable security
vulnerability that came out today - been in glibc since 2000:

http://www.openwall.com/lists/oss-security/2015/01/27/9

# - Despite these limitations, arbitrary code execution can be achieved.
#  As a proof of concept, we developed a full-fledged remote exploit
#  against the Exim mail server, bypassing all existing protections
#  (ASLR, PIE, and NX) on both 32-bit and 64-bit machines. We will
#  publish our exploit as a Metasploit module in the near future.

Updates are out for RHEL 5, 6 & 7 as well as Debian Wheezy.

Some more useful info from the discoverers about services they *suspect*
may not be vulnerable:

http://seclists.org/oss-sec/2015/q1/283

# Here is a list of potential targets that we investigated (they
# all call gethostbyname, one way or another), but to the best
# of our knowledge, the buffer overflow cannot be triggered in
# any of them:
#
# apache, cups, dovecot, gnupg, isc-dhcp, lighttpd, mariadb/mysql,
# nfs-utils, nginx, nodejs, openldap, openssh, postfix, proftpd,
# pure-ftpd, rsyslog, samba, sendmail, sysklogd, syslog-ng,
# tcp_wrappers, vsftpd, xinetd.
#
# That being said, we believe it would be interesting if other
# people could have a look, just in case we missed something.


-- 
 Christopher Samuel        Senior Systems Administrator
 VLSCI - Victorian Life Sciences Computation Initiative
 Email: [email protected] Phone: +61 (0)3 903 55545
 http://www.vlsci.org.au/      http://twitter.com/vlsci

_______________________________________________
Beowulf mailing list, [email protected] sponsored by Penguin Computing
To change your subscription (digest mode or unsubscribe) visit 
http://www.beowulf.org/mailman/listinfo/beowulf

Reply via email to