Yet another OS level vuln was found recently and made pub this morning. GHOST effects glibc C library and allows full remote machine control because of a buffer pwnage. Recommended to update and restart all yas boxes
https://access.redhat.com/articles/1332213
https://www.qualys.com/company/newsroom ... x-systems/
https://creadev.org | support@creadev.org - Opencart Extensions, Integrations, & Development. Made in the USA.
No need to shout.
Effected are only glibc versions between 2.1.2 and 2.1.7 which are all very outdated and if the server admins know their job this issue should be no one anymore.
Effected are only glibc versions between 2.1.2 and 2.1.7 which are all very outdated and if the server admins know their job this issue should be no one anymore.
Full Stack Web Developer :: Dedicated OpenCart Development & Support DACH Region
Contact for Custom Work / Fast Support.
Never assume admins do their job. There are thousands of terrible outdated hosts, amateur resellers, and scam-overloaded-boxes at $3/mo hosting outta some 3rd world country. Also, in a VPS age, the "system admins" are the store operators which generally have very little knowledge of Linux and no time to learn.
How often do you think a common man OP is gonna SSH in let alone run yum update? Howabout an old VPS running Cent5? Still plenty of those out there too (even with those above mentioned resellers/scammers). Basically there IS a need to shout whether "good admins" need to hear it or not...its for the DiY OP's
How often do you think a common man OP is gonna SSH in let alone run yum update? Howabout an old VPS running Cent5? Still plenty of those out there too (even with those above mentioned resellers/scammers). Basically there IS a need to shout whether "good admins" need to hear it or not...its for the DiY OP's
https://creadev.org | support@creadev.org - Opencart Extensions, Integrations, & Development. Made in the USA.
Who is online
Users browsing this forum: Dragon Lady and 102 guests