Linux oriented operating systems affected vulnerability, possibilities for remote attackers to access complete control of a system,this vulnerability is a critical and attacks many servers. Its works for buffer overflow bug in glibc's function.
Glibc 2.2 to 2.17 version are at risk so you want to update latest version based on different operating systems and versions..
Check System Vulnerability:
Simplest way to check whether your servers are vulnerable to HOST with test your glibc version with below commands
Ubuntu / Debian:
ldd (GNU libc) 2.12
Copyright (C) 2010 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Written by Roland McGrath and Ulrich Drepper.
CentOS / RHEL
glibc-2.12-1.132.el6_5.4.x86_64
Which versions are Safe your server:
The below glibc versions are matches in your operating system its safe from GHOST vulnerability,
Ubuntu/Debian:
Ubuntu 12.04 LTS: 2.15-0ubuntu10.10
Ubuntu 10.04 LTS: 2.11.1-0ubuntu7.20
Debian 7 LTS: 2.13-38+deb7u7
RHEL/CentOS
RHEL 5: glibc-2.5-123.el5_11.1
RHEL 6: glibc-2.12-1.149.el6_6.5
RHEL 7: glibc-2.17-55.el7_0.5
CentOS 6: glibc-2.12-1.149.el6_6.5
CentOS 7: glibc-2.17-55.el7_0.5
How to Fix :
We can fixed this GHOST vulnerability in easiest way, update your glibc version using yum update or apt-get update,
Ubuntu / Debian:
CentOS / RHEL
Update latest glibc package using yum command, for example below packages updates in server
Dependencies Resolved
==================================================================
Package Arch Version
==================================================================
Updating:
glibc i686 2.12-1.149.el6_6.5
glibc x86_64 2.12-1.149.el6_6.5
Updating for dependencies:
glibc-common x86_64 2.12-1.149.el6_6.5
glibc-devel i686 2.12-1.149.el6_6.5
glibc-devel x86_64 2.12-1.149.el6_6.5
glibc-headers x86_64 2.12-1.149.el6_6.5
glibc-static x86_64 2.12-1.149.el6_6.5
Transaction Summary
==================================================================
Once installation completed reboot your system with below command,
or
# init 6
Updated ?
Ubuntu / Debian:
ldd (Ubuntu EGLIBC 2.19-0ubuntu6.3) 2.19
Copyright (C) 2014 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Written by Roland McGrath and Ulrich Drepper
CentOS / RHEL
glibc-2.12-1.149.el6_6.5.x86_64
or
glibc-static-2.12-1.149.el6_6.5.x86_64
glibc-common-2.12-1.149.el6_6.5.x86_64
glibc-2.12-1.149.el6_6.5.x86_64
glibc-devel-2.12-1.149.el6_6.5.x86_64
glibc-headers-2.12-1.149.el6_6.5.x86_64
Comments (0)