CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow


sambo

Recommended Posts

Critical security found in glibc, update asap!

 

http://seclists.org/oss-sec/2015/q1/274

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.1260924

 

 


wget http://sf.net/projects/mancha/files/sec/CVE-2015-0235-test.c
gcc CVE-2015-0235-test.c -o CVE
./CVE
vulnerable


wget ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/glibc-2.17-x86_64-10_slack14.1.txz
installpkg glibc-2.17-x86_64-10_slack14.1.txz
./CVE
not vulnerable

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.