-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Subject: "GHOST" (CVE-2015-0235)

 **
 / This severe vulnerability detected in the GNU / Linux C Library
 gives control to the attackers without requiring system identifiers.
 - Patches available today - /

 *
 On January 27, 2015 - * _Qualys, Inc ._ (NASDAQ: QLYS), the main
 security solutions provider and Compliance in the Cloud,
 announced that its security research team loaded discovered
 in the C library of GNU / Linux (glibc) a critical vulnerability
 that allows hackers to take remote control of any one
 system, is fully passing système.  Qualys a password
 worked closely and coordinated with suppliers
 Linux distributions to provide a patch for all distributions
 of affected Linux systems.  This patch is available now
 with corresponding suppliers.

 Named GHOST (CVE-2015-0235) because it can be triggered by
 _gethostbyname the functions and gethostbyaddr_ this vulnerability
 affects many systems from Linux glibc version 2.2
 published on 10 November 2000. Qualys researchers have also
 identified several factors that mitigate the impact of this
 vulnerability, including one published May 21, 2013 between patch
 glibc-2.17 versions and glibc-2.18.  Unfortunately, this patch
 not having been classified as a security bulletin, most
 stable distributions and enjoying a long term support were
 exposed, including Debian 7 ("Wheezy"), Red Hat Enterprise Linux 6 & 7
 CentOS 6 & 7 and Ubuntu 12.04.

 Qualys customers can detect GHOST using signature
 QID 123,191 provided by the Cloud _Qualys Service Vulnerability
 Management_ (VM).  When they launch the next scan cycle, they
 get detailed reports on the exposure of their company
 this severe vulnerability.  They will be able to estimate its impact on
 their activity and effectively monitor the speed of problem resolution.

 "GHOST exposed to a remote code execution risk making
 operation of a machine by a hacker terribly enfantine.Il
 Just such an attacker sends an email on a Linux system
 to automatically get full access to this machine "
 says Wolfgang Kandek, CTO of Qualys, Inc. "With
 Given the number of systems based on glibc, we believe that
 This is a serious vulnerability that must be corrected
 immediately.The best course of action to mitigate the risk
 apply a patch provided by your Linux distribution provider


Jamenson Ferreira Espindula de Almeida Melo
Linux user nº 166197
https://linuxcounter.net/cert/166197.png

Impressão digital da chave:
234D 1914 4224 7C53 BD13  6855 2AE0 25C0 08A8 6180


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJUyV4wAAoJECrgJcAIqGGA4nYH+gML30qKkNGxFYqw1c+XvYDC
I5lihbSg5B4JYnNALl364yOKCKmEnZ+XamdxuHESFa18X4UNVKlTRsOKrLZ4gC8G
ZrjxgWH9hVYDYR/7AF+TIzfjW2XZ/f7zA9bMRoNiMS19N6ELNsxmkjTvzTQVPsM+
hj/KzvzACe0IxebqUayOpqC5iWx4COBvCz0qrUiHfNt+vCyPooBqyy79zfQD+W5C
nUMP5I7cp+FzaHeGr+/85HC8c3qGMuYLdUaA9U6/bB4fvN8Qs21DDj1heTD0HpF8
kcr1E7kgT2Qi2EjQwddQNb0a6Xbbz6YSp+R1uMbM1hmnwHWHTWBp6QhSTEKhosw=
=VWfa
-----END PGP SIGNATURE-----
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to