avatar
Linux vulnerability "GHOST"# Programming - 葵花宝典
a*a
1
父爱如山, 祝天下父亲健康快乐, 平安幸福!
本版ID, 请为自己的父亲或者ld送上简单祝福,光回复re, pai, 排,吃的木包子哈
avatar
w*z
2
Highly critical “Ghost” allowing code execution affects most Linux systems
New bug haunting Linux could spark "a lot of collateral damage on the
Internet."
by Dan Goodin - Jan 27 2015, 11:32am PST
Share
Tweet
110
Pixabay
An extremely critical vulnerability affecting most Linux distributions gives
attackers the ability to execute malicious code on servers used to deliver
e-mail, host webpages, and carry out other vital functions.
The vulnerability in the GNU C Library (glibc) represents a major Internet
threat, in some ways comparable to the Heartbleed and Shellshock bugs that
came to light last year. The bug, which is being dubbed "Ghost" by some
researchers, has the common vulnerability and exposures designation of CVE-
2015-0235. While a patch was issued two years ago, most Linux versions used
in production systems remain unprotected at the moment. What's more,
patching systems requires core functions or the entire affected server to be
rebooted, a requirement that may cause some systems to remain vulnerable
for some time to come.
The buffer overflow flaw resides in __nss_hostname_digits_dots(), a glibc
function that's invoked by the gethostbyname() and gethostbyname2() function
calls. A remote attacker able to call either of these functions could
exploit the flaw to execute arbitrary code with the permissions of the user
running the application. In a blog post published Tuesday, researchers from
security firm Qualys said they were able to write proof-of-concept exploit
code that carried out a full-fledged remote code execution attack against
the Exim mail server. The exploit bypassed all existing exploit protections
available on both 32-bit and 64-bit systems, including address space layout
randomization, position independent executions, and no execute protections.
Qualys has not yet published the exploit code but eventually plans to make
it available as a Metasploit module.
“A lot of collateral damage on the Internet”
The glibc is the most common code library used by Linux. It contains
standard functions that programs written in the C and C++ languages use to
carry out common tasks. The vulnerability also affects Linux programs
written in Python, Ruby, and most other languages because they also rely on
glibc. As a result, most Linux systems should be presumed vulnerable unless
they run an alternative to glibc or use a glibc version that contains the
update from two years ago. The specter of so many systems being susceptible
to an exploit with such severe consequences is prompting concern among many
security professionals.
Besides Exim, other Linux components or apps that are potentially vulnerable
to Ghost include MySQL servers, Secure Shell servers, form submission apps,
and other types of mail servers. Update: In a later post, Qualys
researchers enumerated apps they believed were not vulnerable. The list
included Apache, Cups, Dovecot, GnuPG, isc-dhcp, lighttpd, mariadb/mysql,
nfs-utils, nginx, nodejs, openldap, openssh, postfix, proftpd, pure-ftpd,
rsyslog, samba, sendmail, sysklogd, syslog-ng, tcp_wrappers, vsftpd, and
xinetd.
"If [researchers] were able to remotely exploit a pretty modern version of
Exim with full exploit mitigations, that's pretty severe," said Jon
Oberheide, a Linux security expert and the CTO of two-factor authentication
service Duo Security. "There could be a lot of collateral damage on the
Internet if this exploit gets published publicly, which it looks like they
plan to do, and if other people start to write exploits for other targets."
The bug affects virtually all Linux-based software that performs domain name
resolution. As result, it most likely can be exploited not only against
servers but also client applications. Word of the vulnerability appears to
have caught developers of the Ubuntu, Debian, and Red Hat distributions of
Linux off guard. At the time this post was being prepared they appeared to
be aware of the bug but had not yet distributed a ready-made fix. People who
administer Linux systems should closely monitor official channels for
information about how specific distributions are affected and whether a
patch is available. Admins should also prepare for the inevitable reboots
that will be required after installing the patch.
Update: Red Hat Enterprise Linux 5, has an update here, and readers are
reporting a fix is also available for Ubuntu 12.04.
avatar
y*g
3
Re
嘿嘿,才看见要求
Happy Father's day
avatar
l*z
4
Happy Father's day
avatar
h*n
5
Happy Father's day
avatar
l*d
6
Happy Father's day
avatar
n*7
7
Happy Father's day
avatar
s*3
8
Happy Father's day
avatar
t*g
9
祝父亲健康长寿!祝LD健康快乐,能挣到我花不完的钱!
avatar
a*a
10
赞, 都是很实在的祝福啊 :)

【在 t**********g 的大作中提到】
: 祝父亲健康长寿!祝LD健康快乐,能挣到我花不完的钱!
avatar
y*n
11
希望远方的父亲也是快乐幸福的。
avatar
R*C
12
Happy father's day
avatar
s*a
13
Happy father's day
avatar
c*w
14
Happy father's day!
★ Sent from iPhone App: iReader Mitbbs Lite 7.56
avatar
b*r
15
Happy Father's day
avatar
j*g
16
祝所有父亲身体健康

【在 a****a 的大作中提到】
: 父爱如山, 祝天下父亲健康快乐, 平安幸福!
: 本版ID, 请为自己的父亲或者ld送上简单祝福,光回复re, pai, 排,吃的木包子哈
:

avatar
B*a
17
Father happy day!
avatar
w*w
18
排,想吃.
avatar
n*r
19
祝父亲健康长寿!
avatar
w*w
20
希望偶能养好子女。

【在 w**w 的大作中提到】
: 排,想吃.
avatar
p*l
21
祝父亲健康,长寿!是我最大的心愿
avatar
l*o
22
Happy Father's day

【在 a****a 的大作中提到】
: 父爱如山, 祝天下父亲健康快乐, 平安幸福!
: 本版ID, 请为自己的父亲或者ld送上简单祝福,光回复re, pai, 排,吃的木包子哈
:

avatar
f*g
23
祝天下所有老爹万寿无疆

【在 a****a 的大作中提到】
: 父爱如山, 祝天下父亲健康快乐, 平安幸福!
: 本版ID, 请为自己的父亲或者ld送上简单祝福,光回复re, pai, 排,吃的木包子哈
:

avatar
N*s
24
re

【在 a****a 的大作中提到】
: 父爱如山, 祝天下父亲健康快乐, 平安幸福!
: 本版ID, 请为自己的父亲或者ld送上简单祝福,光回复re, pai, 排,吃的木包子哈
:

avatar
N*s
25
g节日快乐。。

【在 a****a 的大作中提到】
: 父爱如山, 祝天下父亲健康快乐, 平安幸福!
: 本版ID, 请为自己的父亲或者ld送上简单祝福,光回复re, pai, 排,吃的木包子哈
:

avatar
l*a
26
父亲节快乐
avatar
n*n
27
祝父亲健康长寿!
avatar
l*f
28
祝父亲身体健康、顺心如意
avatar
n*n
29
祝父亲健康长寿!
avatar
l*t
30
遥祝彼岸的老爸健康快乐!
and Happy Father's Day to me too! lol
avatar
s*u
31
爸爸我永远爱你。
avatar
r*s
32
祝老爸身体健康!

【在 a****a 的大作中提到】
: 父爱如山, 祝天下父亲健康快乐, 平安幸福!
: 本版ID, 请为自己的父亲或者ld送上简单祝福,光回复re, pai, 排,吃的木包子哈
:

avatar
i*c
33
Happy Father's day
avatar
B*s
34
老爹长命百岁
avatar
h*s
35
All DADs, happy father's day
avatar
y*a
36
Happy father's day to my dad and my LD!
avatar
j*y
37
avatar
p*r
38
能吃到末?

【在 a****a 的大作中提到】
: 父爱如山, 祝天下父亲健康快乐, 平安幸福!
: 本版ID, 请为自己的父亲或者ld送上简单祝福,光回复re, pai, 排,吃的木包子哈
:

avatar
s*y
39
祝当爹的都开开心心~

【在 a****a 的大作中提到】
: 父爱如山, 祝天下父亲健康快乐, 平安幸福!
: 本版ID, 请为自己的父亲或者ld送上简单祝福,光回复re, pai, 排,吃的木包子哈
:

avatar
K*N
40
祝老爹老公身体健康!外加老公多多挣银子。早日实现我想去哪里就去哪里的梦想。
avatar
b*e
41
祝天下的慈父们身体健康,工作顺利
avatar
w*y
42
祝老爹早日康复,老大生活幸福,自己吗心想事成,广大的父亲们节日快乐。
avatar
a*a
43
有, 发到这里 :)
增加一句祝福吧?

【在 w******y 的大作中提到】
: 祝老爹早日康复,老大生活幸福,自己吗心想事成,广大的父亲们节日快乐。
avatar
g*g
44
父亲节快乐,希望老爹身体健康,快乐多多,心情好好~~~~
avatar
g*g
45
啊?没赶上啊
avatar
a*a
46
不好意思啊, 刚截止, 你这个包子我发给你 :)

【在 g*********g 的大作中提到】
: 啊?没赶上啊
avatar
a*a
47
帮你后面补的内容修改到这个帖子中来了哈, 父亲节快乐 :)

【在 w******y 的大作中提到】
: 祝老爹早日康复,老大生活幸福,自己吗心想事成,广大的父亲们节日快乐。
avatar
g*g
48
那怎么好意思呢,本来就是我自己没赶上啊,嘿嘿,多谢斑竹

【在 a****a 的大作中提到】
: 不好意思啊, 刚截止, 你这个包子我发给你 :)
相关阅读
logo
联系我们隐私协议©2024 redian.news
Redian新闻
Redian.news刊载任何文章,不代表同意其说法或描述,仅为提供更多信息,也不构成任何建议。文章信息的合法性及真实性由其作者负责,与Redian.news及其运营公司无关。欢迎投稿,如发现稿件侵权,或作者不愿在本网发表文章,请版权拥有者通知本网处理。