GHOST glibc gethostbyname() vulnerability CVE-2015-0235

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ม.ค. 2025

ความคิดเห็น • 11

  • @PatrickCossette
    @PatrickCossette 10 ปีที่แล้ว +1

    Thanks for this video. As always, great info, well structured and complete.
    Happy patching :-)

  • @MohammedAlMansari
    @MohammedAlMansari 10 ปีที่แล้ว

    Really nice illustration .. clean clear and objective! Thank you very much!

  • @SANSISC
    @SANSISC  10 ปีที่แล้ว +1

    We will have a followup/wrap webcast up about Ghost on Friday, February 6th 2015 . See www.sans.org/webcasts/wrapping-ghost-lessons-learned-ghost-vulnerability-99642 for details.

  • @James-ej4lb
    @James-ej4lb 9 ปีที่แล้ว

    Thank you for Breaking this vulnerability down and explaining.

  • @nickthomas89
    @nickthomas89 10 ปีที่แล้ว

    Excellent!

  • @squip88
    @squip88 10 ปีที่แล้ว +1

    Thanks for the great info.

  • @salimhassen3726
    @salimhassen3726 10 ปีที่แล้ว

    thx for the tour
    it was really great
    why not make a simple poc for the process

  • @moodswings1938
    @moodswings1938 10 ปีที่แล้ว

    Thank you! I really need to understand it and you delivered a very specific explanation. But if you can provide us an explantion were in non IT people can udnerstand that would be great!
    Anyways Kudos! It's a very great help!

  • @billt913
    @billt913 10 ปีที่แล้ว

    So we should patch then? (j/k)

  • @dhanshekar6846
    @dhanshekar6846 10 ปีที่แล้ว

    HI this is wonder full explanation , do we require this patch to be applied on ESX env pl advise ?

    • @SANSISC
      @SANSISC  10 ปีที่แล้ว

      ESX likely uses a vulnerable library, but I doubt it will be easy to reach and exploit. Wait for VMWare to release a patch. I don't think there is too much to worry about at this point