- Install cPanel on a Virtual Server Running CentOS 6 with 7 Simple Steps
- Clear Your System Cache in Ubuntu with These Quick Steps
- Install MariaDB on CentOS 7 with these Simple Steps
- What is an A Record?
- Smartermail vs. Mailenable – What does it hold for you?
- Common Issues with Website Migration
- Tips to Evade Spamming
- Dirty Cow Vulnerability – Check How Dirty It Is?
- It’s Time to Update Your Server
- How to Change the Listening Port for Remote Desktop?
Tag Archives: glibc ghost exploit
A critical vulnerability in the glibc library has been announced by Red Hat Product Security, assigned as CVE-2015-0235 and is commonly called as ‘GHOST’.
What is GHOST?
A buffer-overflow bug, GHOST affects the gethostbyname() and gethostbyname2() function calls in the glibc library. A remote attacker can make an application call to either of these functions to execute arbitrary code with the permissions of the user running the application.
Impact of GHOST
The gethostbyname() function call is used for resolving DNS which is a very common event. This vulnerability can be exploited by an attacker by triggering a buffer overflow by offering an invalid hostname argument to an application that performs a DNS resolution.