Update if you have them: Ghost glibc gethostbyname() heap based buffer overflow!

home | blog | Terrible people and places | Covid-19 links | Teh Internet | guest blog |rants | placeholder | political | projects | Gwen and Liam | Citadel patched | Tools | Scouts




http://ma.ttias.be/critical-glibc-update-cve-2015-0235-gethostbyname-calls/
(Expect|assume) exploits exist or are coming very soon.
If you think you are immune, just think of all the code you have that does any dns resolving using glibc gethostbyname().



[æ]