"Ghost" Vulnerability: What You Should Know in Regard to Redtail

On January 27 Qualys researchers announced a glibc vulnerability that involves a buffer overflow that is reachable both locally and remotely using the gethostbyname*() functions in glibc. CVE-2015-0235, nicknamed "Ghost", poses the risk of remote code execution by attackers on Linux based systems.

Upon learning of this new security vulnerability, we immediately began assessing the potential threat in regard to Redtail's infrastructure and applied the recommended patch for this vulnerability.

Rest assured we take all threats of this nature seriously and we will continue to monitor ongoing updates concerning the Ghost vulnerability and react accordingly should additional action be required on our end.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request


Powered by Zendesk