The Glibc GHOST Vulnerability – How to Patch your Linux Server/VPS?

A very serious security problem is just found in GNU C library, Glibc, announced yesterday, Jan 27, 2015.
This is a critical vulnerability that almost every linux Machine is going to effect by it.

Accoding to qualys

What is glibc?

The GNU C Library or glibc is an implementation of the standard C library and a core part of the Linux operating system. Without this library a Linux system will not function.

What is the vulnerability?

During a code audit Qualys researchers discovered a buffer overflow in the __nss_hostname_digits_dots() function of glibc. This bug can be triggered both locally and remotely via all the gethostbyname*() functions. Applications have access to the DNS resolver primarily through the gethostbyname*() set of functions. These functions convert a hostname into an IP address.

this command will show you the version of Glibc on your server.

How to Patch your Server

CentOS/Fedora based servers

Debian/Ubuntu based servers

save it as ghosttest.c

Compile and run

If you get

Then it means you are safe

and If you get

Then you need to apply patch.

Please follow and like us:
About shk

shk is a DevOps engineer with more than 12 years of experience in different organizations. He enthusiastic about learning new technologies and shares his knowledge through his blogs.

Comment Policy:

Your words are your own, so be nice and helpful if you can. Please, only use your real name, not your business name or keywords. Using business name or keywords instead of your real name will lead to the comment being deleted. Anonymous commenting is not allowed either. Limit the amount of links submitted in your comment. We accept clean XHTML in comments, but don't overdo it please.

Tell us what you're thinking...

All comments are moderated.

* Denotes required field.

*

*

Previous Post:
Next Post: