Filename | Scary GHOST vulnerabilty leaves Linux systems vulnerable to Possession : ECCOUNICL PRESENTATION |
Permission | rw-r--r-- |
Author | Unknown |
Date and Time | 2/03/2015 |
Label | Cyber News |
Action |
Ethical Hacking Institute in Pune
./Arizona Team
Hello every one, this post contains Weekly Presentation from Ec-Council.
Topic from the Presentation:
The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials. CVE-2015-0235 has been assigned to this issue.
Qualys security researchers discovered this bug and worked closely with Linux distribution vendors. And as a result of that we are releasing this advisory today as a co-ordinated effort, and patches for all distribution are available January 27, 2015.
Link for the presentation:
https://aspen.eccouncil.org/WeeklyMondayPresentation.aspx
Remember you need to register for downloading the Presentation.
www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune
./Arizona Team
Hello every one, this post contains Weekly Presentation from Ec-Council.
Topic from the Presentation:
The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials. CVE-2015-0235 has been assigned to this issue.
Qualys security researchers discovered this bug and worked closely with Linux distribution vendors. And as a result of that we are releasing this advisory today as a co-ordinated effort, and patches for all distribution are available January 27, 2015.
Link for the presentation:
https://aspen.eccouncil.org/WeeklyMondayPresentation.aspx
Remember you need to register for downloading the Presentation.
www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune