Get a Pentest and security assessment of your IT network.

Cyber Security

How to Detect Exploits of the GHOST Buffer Overflow Vulnerability

GHOST vulnerability is a buffer overflow condition that can be easily exploited locally and remotely. The attack allows the attacker to execute arbitrary code and take control of the victim’s vulnerable machine. Vulnerability exists in the GNU C Library (glibc), a code library originally released in 2000, meaning it has been widely distributed. Although an update released by Linux in 2013 mitigated this vulnerability, most systems and products have not installed the patch. USM can scan your network to identify assets with the vulnerability, making it easy for you to identify systems that need to be patched and prioritize remediation.

Source: https://thehackernews.com/2015/02/ghost-buffer-overflow-vulnerability.html

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security