Post by Dhaupin » Wed Jan 28, 2015 11:03 pm

Yet another OS level vuln was found recently and made pub this morning. GHOST effects glibc C library and allows full remote machine control because of a buffer pwnage. Recommended to update and restart all yas boxes

https://access.redhat.com/articles/1332213

https://www.qualys.com/company/newsroom ... x-systems/

https://creadev.org | support@creadev.org - Opencart Extensions, Integrations, & Development. Made in the USA.


User avatar
Active Member

Posts

Joined
Tue May 13, 2014 3:45 am
Location - PA

Post by OSWorX » Wed Jan 28, 2015 11:57 pm

No need to shout.
Effected are only glibc versions between 2.1.2 and 2.1.7 which are all very outdated and if the server admins know their job this issue should be no one anymore.

Full Stack Web Developer :: Dedicated OpenCart Development & Support DACH Region
Contact for Custom Work / Fast Support.


User avatar
Guru Member

Posts

Joined
Mon Jan 11, 2010 10:52 pm
Location - Austria

Post by Dhaupin » Thu Jan 29, 2015 12:16 am

Never assume admins do their job. There are thousands of terrible outdated hosts, amateur resellers, and scam-overloaded-boxes at $3/mo hosting outta some 3rd world country. Also, in a VPS age, the "system admins" are the store operators which generally have very little knowledge of Linux and no time to learn.

How often do you think a common man OP is gonna SSH in let alone run yum update? Howabout an old VPS running Cent5? Still plenty of those out there too (even with those above mentioned resellers/scammers). Basically there IS a need to shout whether "good admins" need to hear it or not...its for the DiY OP's :)

https://creadev.org | support@creadev.org - Opencart Extensions, Integrations, & Development. Made in the USA.


User avatar
Active Member

Posts

Joined
Tue May 13, 2014 3:45 am
Location - PA
Who is online

Users browsing this forum: No registered users and 36 guests