ABOUT THE COURSES
This vulnerability allows a local or remote attacker to execute code within the context of an application linked with certain versions of the glibc library. The vulnerability is triggered by a buffer overflow in the gethostbyname() function, called when resolving a hostname to an IP.
Immediate patches are required to fix a vulnerability in glibc that allows arbitrary code execution from unauthenticated users. It is necessary to restart computers or processes following patching.
Ghost enables code execution, arbitrary data disclosure, and system compromise from unauthenticated remote attackers. The ways that a system could be vulnerable to this bug are numerous, and no exhaustive list could be compiled. Patching is required immediately, as a proof-of-concept is soon to be publicly released.
CODE OF ETHICS - EC-Council
What You Will Learn
The following tables list Microsoft Certifications by name and describe how they enable IT professionals to display and validate their skills and experience.
|Module 03:||Threat Assessment|
|Module 04:||Vulnerability Assessment|
|Module 05:||Risk Analysis|
|Module 06:||Upgrade Recommendations|
|Module 07:||Re-Valuation of Risks|