Lucene search

K
cisaCISACISA:E8C8F007DF2A448F84459142FD8D46F7
HistoryJan 27, 2015 - 12:00 a.m.

Linux "Ghost" Remote Code Execution Vulnerability

2015-01-2700:00:00
us-cert.cisa.gov
29

0.975 High

EPSS

Percentile

100.0%

The Linux GNU C Library (glibc) versions 2.2 and other 2.x versions before 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system.

US-CERT recommends users and administrators refer to their respective Linux or Unix-based OS vendor(s) for an appropriate patch if affected. Patches are available from Ubuntu, Red Hat, and Debian. The GNU C Library versions 2.18 and later are also available for experienced users and administrators to implement.

This product is provided subject to this Notification and this Privacy & Use policy.

Please share your thoughts.

We recently updated our anonymous product survey; we’d welcome your feedback.