Guest Author
Security researchers discovered another security hole in Linux systems. The GHOST vulnerability might leave your system open to hackers.
The GHOST name derives from the issue with the GetHOST functions. Hackers access your system Through gethostbyname functions hackers can access a remote shell in Linux and seize control of your system without system credentials.
The severity of the vulnerability warrants immediate attention. Ubuntu, different versions of RHEL, CentOS 6 and 7, and Debian 7 are vulnerable to the problem. However, they all now supply patches. There is only one thing left for you to do. Go update and reboot your Linux system with the patch updates.
Qualys, a cloud security company, first discovered and announced the problem. For more information on the vulnerability, read about the original announcement at the Qualys blog.
subscribe by email
Stay Ahead
Related Posts
-
Cyber Security
STRENGTHEN YOUR CYBERCORE!
December 16, 2020
-
Cyber Security
Security + Changes!
November 17, 2020
-
Cyber Security
What’s the 411 with the updated CySA+?
October 12, 2020