How To Protect Your Linux Server from the GHOST Vulnerability

GHOST vulnerability affecting Linux systems was discovered in the C library of GNU / Linux (glibc) that gives control to attackers without requiring system credentials.

ghost-linux-security-vulnerability-e1422467010987.png.pagespeed.ce.SiGafGqc3D

GHOST creates a buffer overflow that affects all the gethostbyname*() functions in the glibc library. These functions change a hostname into an IP addresses. A hacker exploiting this can gain complete access of the Linux machine.

(more…)

Continue ReadingHow To Protect Your Linux Server from the GHOST Vulnerability