Linux/UNIX bash_shell

butonel: Liviu | ianuarie 29th, 2015

Cum rezolvam GHOST in RedHat/CentOS – Vulnerabilitate linux CVE-2015-0235

Pe 27 01 2015 a fost descoperita o vulnerabilitate in functiile gethostbyname() si gethostbyname2() din libraria glibc care ar putea permite unui atacator sa execute comenzi  remote. ( http://www.openwall.com/lists/oss-security/2015/01/27/9 ).

 

testez daca sistemul este vulnerabil:

[root@redmarlboro /]# wget smartvps.ro/share/ghosttest.c
–2015-01-29 21:50:22– http://smartvps.ro/share/ghosttest.c
Resolving smartvps.ro… 193.138.192.139
Connecting to smartvps.ro|193.138.192.139|:80… connected.
HTTP request sent, awaiting response… 200 OK
Length: 1029 (1.0K) [text/x-c]
Saving to: ghosttest.c

100%[====================================================================================================================================>] 1,029 –.-K/s in 0s

2015-01-29 21:50:22 (136 MB/s) – ghosttest.c

 

[root@redmarlboro /]# gcc ghosttest.c -o ghosttest

[root@redmarlboro /]# ./ghosttest

vulnerable

 

apoi yum update:

yum clean all

yum update

 

sau, daca nu vrem sa riscam vreun update gresit:

[root@redmarlboro /]# yum update glibc.x86_64

 

testam din nou:

[root@redmarlboro /]# ./ghosttest
not vulnerable

 

Apoi se recomanda reboot.

 

 



Back to Top ↑