vulnerabilities:ghost
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
vulnerabilities:ghost [2016/10/20 09:00] – peter | vulnerabilities:ghost [2019/12/04 22:19] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Vulnerabilities - GHOST ====== | ||
- | A GNU C Library (glibc) vulnerability, | ||
- | |||
- | The GHOST vulnerability can be exploited on Linux systems that use an unpatched version of glibc from versions 2.2 to 2.17. | ||
- | |||
- | It is highly recommended that you update and reboot all of your affected Linux servers. | ||
- | |||
- | |||
- | ===== Check System Vulnerability ===== | ||
- | |||
- | The easiest way to test if your servers are vulnerable to GHOST is to check the version of glibc that is in use. | ||
- | |||
- | Check the version glibc by looking up the version of ldd (which uses glibc) like this: | ||
- | |||
- | <code bash> | ||
- | ldd --version | ||
- | </ | ||
- | |||
- | The first line of the output will contain the version of eglibc, the variant of glibc that Ubuntu and Debian use. It might look like this: | ||
- | |||
- | < | ||
- | ldd (Ubuntu EGLIBC 2.15-0ubuntu10.7) 2.15 | ||
- | Copyright (C) 2012 Free Software Foundation, Inc. | ||
- | This is free software; see the source for copying conditions. | ||
- | warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. | ||
- | Written by Roland McGrath and Ulrich Drepper. | ||
- | </ | ||
- | |||
- | |||
- | ===== Fix Vulnerability ===== | ||
- | |||
- | The easiest way to fix the GHOST vulnerability is to use your default package manager to update the version of glibc. | ||
- | |||
- | <code bash> | ||
- | sudo apt-get update && sudo apt-get dist-upgrade | ||
- | </ | ||
- | |||
- | Then respond to the confirmation prompt with y. | ||
- | |||
- | When the update is complete, reboot the server with this command: | ||
- | |||
- | <code bash> | ||
- | sudo reboot | ||
- | </ | ||
- | |||
- | A reboot is necessary since the GNU C Library is used by many applications that must be restarted to use the updated library. | ||
- | |||
- | |||
- | ===== References ===== | ||
- | |||
- | https:// |
vulnerabilities/ghost.1476954022.txt.gz · Last modified: 2020/07/15 09:30 (external edit)