welcome to netwrkspider

Wednesday, January 28, 2015

How to patch GHOST: glibc vulnerability (CVE-2015-0235) On Redha/Centos/Ubuntu Based Linux

The Linux GNU C Library (glibc) versions prior to 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system. Linux distributions employing glibc-2.18 and later are not affected.

US-CERT recommends users and administrators refer to their respective Linux or Unix-based OS vendor(s) for an appropriate patch if affected. Patches are available from Ubuntu (link is external) and Red Hat (link is external). The GNU C Library versions 2.18 and later are also available for experienced users and administrators to implement.

# How to check the vulnerabilities on server.

1 ) Download the code  : ghost_tester.c

2 ) Compile the code

      root@root:# gcc -o ghost ghost_tester.c
      root@root:# ./ghost  (  It'll gives an output i.e vulnerable or not vulnerable )

#How to patch the Ghost vulnerabilities.

1 ) For Redhat/Centos 5.x/6.x/7.x

yum clean all
yum update 

After Reboot :

2 ) Debian/ Ubuntu Linux

sudo apt-get clean
sudo apt-get update
sudo apt-get dist-upgrade

Note : Reboot your machine after successful update.


No comments: