We will have a followup/wrap webcast up about Ghost on Friday, February 6th 2015 . See www.sans.org/webcasts/wrapping-ghost-lessons-learned-ghost-vulnerability-99642 for details.
Thank you! I really need to understand it and you delivered a very specific explanation. But if you can provide us an explantion were in non IT people can udnerstand that would be great! Anyways Kudos! It's a very great help!
ESX likely uses a vulnerable library, but I doubt it will be easy to reach and exploit. Wait for VMWare to release a patch. I don't think there is too much to worry about at this point
Thanks for this video. As always, great info, well structured and complete.
Happy patching :-)
Really nice illustration .. clean clear and objective! Thank you very much!
We will have a followup/wrap webcast up about Ghost on Friday, February 6th 2015 . See www.sans.org/webcasts/wrapping-ghost-lessons-learned-ghost-vulnerability-99642 for details.
Thank you for Breaking this vulnerability down and explaining.
Excellent!
Thanks for the great info.
thx for the tour
it was really great
why not make a simple poc for the process
Thank you! I really need to understand it and you delivered a very specific explanation. But if you can provide us an explantion were in non IT people can udnerstand that would be great!
Anyways Kudos! It's a very great help!
So we should patch then? (j/k)
HI this is wonder full explanation , do we require this patch to be applied on ESX env pl advise ?
ESX likely uses a vulnerable library, but I doubt it will be easy to reach and exploit. Wait for VMWare to release a patch. I don't think there is too much to worry about at this point