Last update at :2024-01-01,Edit by888u
Vpsadd tutorial: Linux glibc ghost vulnerability can cause hackers to take control of the system
Have you been promoted? Dear, go and make up for it. So scared.
Affected operating system versions CentOS 6, 7 Debian 7 Red Hat Enterprise Linux 6, 7 Ubuntu 10.04, 12.04 and many other Linux distributions using glibc library version 2.2-2.17
Hazards of Linux glibc ghost vulnerability:
This vulnerability causes remote code execution and allows an attacker to gain complete control of the system. The CVE number is CVE-2015-0235, named GHOST vulnerability. Affected versions: versions between glibc-2.2 and glibc-2.17.
Linux glibc ghost vulnerability method:
CentOS/RHEL system: yum install glibc -y Debian/Ubuntu system: apt-get update && apt-get install libc6
The following takes centos as an example:
Centos system:
If it is CentOS6.x, the latest Glibc security version is: glibc-2.12-1.149.el6_6.5)
If it is CentOS5.X, the latest Glibc security version is: glibc-2.5-123.el5_11.1
You can enter the following command to check first:
(View the current system version)
Copy code
(Check the current Glibc version, if it is not the above safe version, apply a patch)
Copy code
Enter the following command:
Copy code
Copy code
Finally restart the system
Copy code
(Some people say you don’t need to restart, some people say you need to. I personally recommend restarting to make the patch 100% effective.)
Recommended site search: Korean server recommendation, space registration, ftp free space ip segment query, vps server asp host space, free overseas server, Hong Kong server, domain name check, overseas server rental price,
发表评论