All Questions
4 questions
1
vote
2
answers
237
views
Can an executable be scanned for calls to the vulnerable glibc ghost functions?
The ghost vulnerability has the potential to be vulnerable to many many pieces of software that call the gethostbyname() and gethostbyname2() functions. Is there an easy way to scan an executable to ...
10
votes
1
answer
4k
views
Is Java vulnerable to glibc GHOST Vulnerability in Linux?
I see on our RedHat Linux platform that "java" process has dependency over glibc library:
[root@hpproliant1 ~]# ldd /usr/bin/java
linux-gate.so.1 => (0xffffe000)
libpthread.so.0 => /lib/...
10
votes
1
answer
8k
views
GHOST: which services are vulnerable, ssh, web server?
GHOST (CVE-2015-0235) just popped up.
GHOST bug: is there a simple way to test if my system is secure? deals with how to find out if your system is vulnerable.
exim is mentioned specifically.
...
61
votes
4
answers
21k
views
GHOST bug: is there a simple way to test if my system is secure?
GHOST (CVE-2015-0235) just popped up. How can I quickly check if a system of mine is secure? Ideally with a one line shell command.
According to the ZDNet article "you should then reboot the system". ...