butonel: Liviu | ianuarie 29th, 2015
Cum rezolvam GHOST in RedHat/CentOS – Vulnerabilitate linux CVE-2015-0235
Pe 27 01 2015 a fost descoperita o vulnerabilitate in functiile gethostbyname() si gethostbyname2() din libraria glibc care ar putea permite unui atacator sa execute comenzi remote. ( http://www.openwall.com/lists/oss-security/2015/01/27/9 ).
testez daca sistemul este vulnerabil:
[root@redmarlboro /]# wget smartvps.ro/share/ghosttest.c
–2015-01-29 21:50:22– http://smartvps.ro/share/ghosttest.c
Resolving smartvps.ro… 193.138.192.139
Connecting to smartvps.ro|193.138.192.139|:80… connected.
HTTP request sent, awaiting response… 200 OK
Length: 1029 (1.0K) [text/x-c]
Saving to: ghosttest.c
100%[====================================================================================================================================>] 1,029 –.-K/s in 0s
2015-01-29 21:50:22 (136 MB/s) – ghosttest.c
[root@redmarlboro /]# gcc ghosttest.c -o ghosttest
[root@redmarlboro /]# ./ghosttest
vulnerable
apoi yum update:
yum clean all
yum update
sau, daca nu vrem sa riscam vreun update gresit:
[root@redmarlboro /]# yum update glibc.x86_64
testam din nou:
[root@redmarlboro /]# ./ghosttest
not vulnerable
Apoi se recomanda reboot.