Many Linux distributions are susceptible to vulnerability in glibc




Many well-known Linux distributions are susceptible to a bug in the GNU C Library that may cause a buffer overflow. Attackers can exploit both local and remote vulnerability, so warn security researchers at Qualys.

The researchers found the bug during an audit on the track. They found the vulnerability in a function of the GNU C Library, known as glibc. This allowed researchers to perform the security malicious code, so write them Tuesday.

Qualys claims that the impact of the bug is enormous. Many existing Linux distributions are in fact vulnerable. These include for Debian 7, Red Hat Enterprise Linux 6 and 7, CentOS 6 and 7 and Ubuntu 12.04. Those distributions are used among others for holding mail services in the air, websites and other important applications.

The bug would Qualys as fifteen years ago in his stolen. The glibc developers would have plugged the leak two years ago, but remarkably not conducted any organization behind the Linux Distributions by the software patch. The bug does not known as vulnerability. Due to the clandestine nature of the bug Qualys calls the error whatsoever ‘Ghost’.

Security researchers have now developed an exploit that is aimed at Exim mail server. The exploit bypasses existing protections in both 32- and 64-bit devices. Qualys soon as an operating module for the popular Metasploit hacker toolkit.


In: A Technology & Gadgets Asked By: [19102 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »

Star Points Scale

Earn points for Asking and Answering Questions!

Grey Sta Levelr [1 - 25 Grey Star Level]
Green Star Level [26 - 50 Green Star Level]
Blue Star Level [51 - 500 Blue Star Level]
Orange Star Level [501 - 5000 Orange Star Level]
Red Star Level [5001 - 25000 Red Star Level]
Black Star Level [25001+ Black Star Level]