Blog | G5 Cyber Security

How to Detect Exploits of the GHOST Buffer Overflow Vulnerability

GHOST vulnerability is a buffer overflow condition that can be easily exploited locally and remotely. The attack allows the attacker to execute arbitrary code and take control of the victim’s vulnerable machine. Vulnerability exists in the GNU C Library (glibc), a code library originally released in 2000, meaning it has been widely distributed. Although an update released by Linux in 2013 mitigated this vulnerability, most systems and products have not installed the patch. USM can scan your network to identify assets with the vulnerability, making it easy for you to identify systems that need to be patched and prioritize remediation.

Source: https://thehackernews.com/2015/02/ghost-buffer-overflow-vulnerability.html

Exit mobile version