Educause Security Discussion mailing list archives

Re: GHOST GLIBC LIBRARY VULNERABILITY


From: Rich Graves <rgraves () CARLETON EDU>
Date: Wed, 28 Jan 2015 12:53:46 -0500

Not that we're not patching, but this is less critical than bashbug or heartbleed. Yes it's gethostbyname(), which 
sounds really really big, but most applications call IPv6-compatible functions that happen not to be vulnerable. 

Simply patching without reboot or service restart addresses the local privilege escalation issue (which is most 
certainly real). 

Also this (joke): http://lcamtuf.blogspot.com/2015/01/technical-analysis-of-qualys-ghost.html 

Current thread: