文件: root - text - article - 2016 - 02 - quickhostuk-critical-vulnerability-notice-cve-2015-7547.txt
标签: 漏洞, 服务器, 安全, Critical Vulnerability, Server, Security, | 英文 | 主页 | 类别: 新闻资讯 | 436 次阅读, 26103 次搜索 | 229 个单词
| 浏览 | 博客存档
标签: 漏洞, 服务器, 安全, Critical Vulnerability, Server, Security, | 英文 | 主页 | 类别: 新闻资讯 | 436 次阅读, 26103 次搜索 | 229 个单词
| 浏览 | 博客存档
Dear 190,
Google has identified a new vulnerability in glibc used by most Linux server OS's.
You can read the article on the Google online security blog: https://googleonlinesecurity.blogspot.co.uk/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
About the vulnerability:
A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module. Details of the vulnerability can be found here: CVE-2015-7547
If you are not a QuickHostUK Managed Hosting customer please ensure you have also taken the appropriate actions to secure your own servers. Alternatively, we can handle this for you with our adhoc management scheme, which for this occurrence would be £30 inc VAT per server.
Please contact us if you wish to utilise this service or if you have any questions.
Kind Regards,
QuickHostUK Limited
Email: [email protected]
Web: www.quickhostuk.com
Phone: 0845 576 0523
Copyright © 2016 QuickHostUK Limited - All Rights Reserved.
Registered in England and Wales. No. 08582667 | VAT Reg No: GB 131 1695 38
Follow us on Twitter for news & live updates - https://twitter.com/QuickHostUK
Tell us what you think - https://www.facebook.com/QuickHostUK?sk=reviews
标签: 漏洞, 服务器, 安全, Critical Vulnerability, Server, Security, | 英文 | 主页 | 类别: 新闻资讯 | 436 次阅读, 26103 次搜索 | 229 个单词 Google has identified a new vulnerability in glibc used by most Linux server OS's.
You can read the article on the Google online security blog: https://googleonlinesecurity.blogspot.co.uk/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
About the vulnerability:
A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module. Details of the vulnerability can be found here: CVE-2015-7547
If you are not a QuickHostUK Managed Hosting customer please ensure you have also taken the appropriate actions to secure your own servers. Alternatively, we can handle this for you with our adhoc management scheme, which for this occurrence would be £30 inc VAT per server.
Please contact us if you wish to utilise this service or if you have any questions.
Kind Regards,
QuickHostUK Limited
Email: [email protected]
Web: www.quickhostuk.com
Phone: 0845 576 0523
Copyright © 2016 QuickHostUK Limited - All Rights Reserved.
Registered in England and Wales. No. 08582667 | VAT Reg No: GB 131 1695 38
Follow us on Twitter for news & live updates - https://twitter.com/QuickHostUK
Tell us what you think - https://www.facebook.com/QuickHostUK?sk=reviews
猜您喜欢...
©2006~2024 牛排过熟 - 0.00924 秒 - 1999.095 KB/s - 71 在线 内存: 492.14 KB
18:54:01 up 13 days, 18:33, 2 users, load average: 0.98, 0.86, 0.73 - 服务器 PHP 版本号: 7.4.33
牛排怎么做才好吃? | <meta name="机器人" content="不索引, 跟踪" />
18:54:01 up 13 days, 18:33, 2 users, load average: 0.98, 0.86, 0.73 - 服务器 PHP 版本号: 7.4.33
评论 (0)
读写完全 - 一般 - 最小 - 表格 - 所有评论 - 统计
当前页暂时没有评论。