Vpsadd tutorial: Linux glibc ghost vulnerability strikes, allowing hackers to take control of the system

888u

Last update at :2024-01-01,Edit by888u

Vpsadd tutorial: Linux glibc ghost vulnerability can cause hackers to take control of the system

Have you been promoted? Dear, go and make up for it. So scared.

Affected operating system versions CentOS 6, 7 Debian 7 Red Hat Enterprise Linux 6, 7 Ubuntu 10.04, 12.04 and many other Linux distributions using glibc library version 2.2-2.17

Hazards of Linux glibc ghost vulnerability:

This vulnerability causes remote code execution and allows an attacker to gain complete control of the system. The CVE number is CVE-2015-0235, named GHOST vulnerability. Affected versions: versions between glibc-2.2 and glibc-2.17.

Linux glibc ghost vulnerability method:

CentOS/RHEL system: yum install glibc -y Debian/Ubuntu system: apt-get update && apt-get install libc6

The following takes centos as an example:

Centos system:

If it is CentOS6.x, the latest Glibc security version is: glibc-2.12-1.149.el6_6.5)

If it is CentOS5.X, the latest Glibc security version is: glibc-2.5-123.el5_11.1

You can enter the following command to check first:

(View the current system version)

Copy code

(Check the current Glibc version, if it is not the above safe version, apply a patch)

Copy code

Enter the following command:

Copy code

Copy code

Finally restart the system

Copy code

(Some people say you don’t need to restart, some people say you need to. I personally recommend restarting to make the patch 100% effective.)

Recommended site search: Korean server recommendation, space registration, ftp free space ip segment query, vps server asp host space, free overseas server, Hong Kong server, domain name check, overseas server rental price,

Vpsadd tutorial: Linux glibc ghost vulnerability strikes, allowing hackers to take control of the system

All copyrights belong to 888u unless special state
取消
微信二维码
微信二维码
支付宝二维码