thanks Jhon

  is   secur...@cloudstack.apache.org a mail list?

how to join it?


2015-01-29 5:05 GMT+08:00 John Kinsella <j...@stratosec.co>:
> FYI the blog post mentioned below now has links to updated SSVM templates.
>
>> On Jan 28, 2015, at 11:49 AM, John Kinsella <j...@stratosec.co> wrote:
>>
>> Folks - just posted mitigation details at [1]. An updated SSVM template is 
>> being QAed, once released the post will be updated with links and we’ll 
>> mention here as well.
>>
>> John
>> 1: https://blogs.apache.org/cloudstack/entry/cloudstack_and_the_ghost_glibc
>>
>> On Jan 28, 2015, at 4:55 AM, Rohit Yadav 
>> <rohit.ya...@shapeblue.com<mailto:rohit.ya...@shapeblue.com>> wrote:
>>
>> Hi,
>>
>> While it's a general public news, everyone is requested and encouraged
>> to use the security mailing list in future to report anything. For more
>> details please read: http://cloudstack.apache.org/security.html
>>
>> Thanks and regards.
>>
>> On Wednesday 28 January 2015 03:34 PM, 
>> linux...@gmail.com<mailto:linux...@gmail.com> wrote:
>> A critical vulnerability has been found in glibc, the GNU C library,
>> that affects all Linux systems dating back to 2000. Attackers can use
>> this flaw to execute code and remotely gain control of Linux machines.
>>
>> The issue stems from a heap-based buffer overflow found in the
>> __nss_hostname_digits_dots() function in glibc. That particular
>> function is used by the _gethostbyname function calls.
>>
>> Related Posts
>>
>> Shellshock Worm Exploiting Unpatched QNAP NAS Devices
>>
>> December 15, 2014 , 11:35 am
>>
>> Linux Modules Connected to Turla APT Discovered
>>
>> December 9, 2014 , 10:26 am
>>
>> Bash Exploit Reported, First Round of Patches Incomplete
>>
>> September 25, 2014 , 11:41 am
>>
>> “A remote attacker able to make an application call either of these
>> functions could use this flaw to execute arbitrary code with the
>> permissions of the user running the application,” said an advisory
>> from Linux distributor Red Hat.
>>
>> The vulnerability, CVE-2015-0235, has already been nicknamed GHOST
>> because of its relation to the _gethostbyname function. Researchers at
>> Qualys discovered the flaw, and say it goes back to glibc version 2.2
>> in Linux systems published in November 2000.
>>
>> According to Qualys, there is a mitigation for this issue that was
>> published May 21, 2013 between patch glibc-2.17 versions and
>> glibc-2.18.
>>
>> “Unfortunately, it was not recognized as a security threat; as a
>> result, most stable and long-term-support distributions were left
>> exposed (and still are): Debian 7 (wheezy), Red Hat Enterprise Linux 6
>> & 7, CentOS 6 & 7, Ubuntu 12.04, for example,” said an advisory from
>> Qualys posted to the OSS-Security mailing list.
>>
>> Respective Linux distributions will be releasing patches; Red Hat has
>> released an update for Red Hat Enterprise Linux v.5 server. Novell has
>> a list of SUSE Linux Enterprise Server builds affected by the
>> vulnerability. Debian has already released an update of its software
>> addressing the vulnerability.
>>
>> “It’s everywhere, which is kind of the urgency we have here. This has
>> been in glibc for a long time. It was fixed recently, but it was not
>> marked as a security issue, so things that are fairly new should be
>> OK,” said Josh Bressers, a member of the Red Hat security response
>> team. “From a threat level, what it comes down to is a handful of
>> stuff that’s probably dangerous that uses this function.”
>>
>> Unlike past Internet-wide bugs such as Bash, patching glibc may not be
>> the chore it was with Bash since so many components made silent Bash
>> calls.
>>
>> “In this instance, you just apply the glibc update, and restart any
>> services that are vulnerable,” Bressers said. “It’s not confusing like
>> Shellshock was.”
>>
>> Qualys, in its advisory, not only shares extremely in-depth technical
>> information on the vulnerability, but also includes a section
>> explaining exploitation of the Exim SMTP mail server. The advisory
>> demonstrates how to bypass NX, or No-eXecute protection as well as
>> glibc malloc hardening, Qualys said.
>>
>> Qualys also said that in addition to the 2013 patch, other factors
>> mitigate the impact of the vulnerability, including the fact that the
>> gethostbyname functions are obsolete because of IPv6 and newer
>> applications using a different call, getaddrinfo(). While the flaw is
>> also exploitable locally, this scenario too is mitigated because many
>> programs rely on gethostbyname only if another preliminary call fails
>> and a secondary call succeeds in order to reach the overflow. The
>> advisory said this is “impossible” and those programs are safe.
>>
>> There are mitigations against remote exploitation too, Qualys said.
>> Servers, for example, use gethostbyname to perform full-circle reverse
>> DNS checks. “These programs are generally safe because the hostname
>> passed to gethostbyname() has normally been pre-validated by DNS
>> software,” the advisory.
>>
>> “It’s not looking like a huge remote problem, right now,” Bressers said.
>>
>> However, while the bug may have been dormant since 2000, there is no
>> way to tell if criminals or government-sponsored hackers have been
>> exploiting this vulnerability. Nor is there any way to tell what will
>> happen once legitimate security researchers—and black hats—begin
>> looking at the vulnerability now that it’s out in the open. With Bash,
>> for example, it didn’t take long for additional security issues to
>> rise to the surface.
>>
>> - See more at: 
>> https://threatpost.com/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems/110679#sthash.3JH6GJTL.dpuf
>>
>>
>>
>>
>>
>>
>>
>> --
>> Regards,
>> Rohit Yadav
>> Software Architect, ShapeBlue
>> M. +91 8826230892 | 
>> rohit.ya...@shapeblue.com<mailto:rohit.ya...@shapeblue.com>
>> Blog: bhaisaab.org<http://bhaisaab.org/> | Twitter: @_bhaisaab
>> PS. If you see any footer below, I did not add it :)
>> Find out more about ShapeBlue and our range of CloudStack related services
>>
>> IaaS Cloud Design & Build<http://shapeblue.com/iaas-cloud-design-and-build//>
>> CSForge – rapid IaaS deployment framework<http://shapeblue.com/csforge/>
>> CloudStack Consulting<http://shapeblue.com/cloudstack-consultancy/>
>> CloudStack Software 
>> Engineering<http://shapeblue.com/cloudstack-software-engineering/>
>> CloudStack Infrastructure 
>> Support<http://shapeblue.com/cloudstack-infrastructure-support/>
>> CloudStack Bootcamp Training 
>> Courses<http://shapeblue.com/cloudstack-training/>
>>
>> This email and any attachments to it may be confidential and are intended 
>> solely for the use of the individual to whom it is addressed. Any views or 
>> opinions expressed are solely those of the author and do not necessarily 
>> represent those of Shape Blue Ltd or related companies. If you are not the 
>> intended recipient of this email, you must neither take any action based 
>> upon its contents, nor copy or show it to anyone. Please contact the sender 
>> if you believe you have received this email in error. Shape Blue Ltd is a 
>> company incorporated in England & Wales. ShapeBlue Services India LLP is a 
>> company incorporated in India and is operated under license from Shape Blue 
>> Ltd. Shape Blue Brasil Consultoria Ltda is a company incorporated in Brasil 
>> and is operated under license from Shape Blue Ltd. ShapeBlue SA Pty Ltd is a 
>> company registered by The Republic of South Africa and is traded under 
>> license from Shape Blue Ltd. ShapeBlue is a registered trademark.
>>
>



-- 
白清杰 (Born Bai)

Mail: linux...@gmail.com

Reply via email to