Vulnerability Analysis

    This vulnerability allows a local or remote attacker to execute code within the context of an application linked with certain versions of the glibc library. The vulnerability is triggered by a buffer overflow in the gethostbyname() function, called when resolving a hostname to an IP.

    Immediate patches are required to fix a vulnerability in glibc that allows arbitrary code execution from unauthenticated users. It is necessary to restart computers or processes following patching.

    Ghost enables code execution, arbitrary data disclosure, and system compromise from unauthenticated remote attackers. The ways that a system could be vulnerable to this bug are numerous, and no exhaustive list could be compiled. Patching is required immediately, as a proof-of-concept is soon to be publicly released.

  • CODE OF ETHICS - EC-Council
    Contact form submitted! We will be in touch soon.










Our students Placed

We train our students as per Industry requirements and place them in different companies in India and Abroad as Networking , Server Engineers/Software Engineers.

STAY TUNED WITH US

Get our updates educational materials, new Courses and more!

© 2010-2016 - Redback IT Solutions. All Rights Reserved. The certification names are the trademarks of their respective owners.View disclaimer|Privacy Policy