Home > System Tutorial > Linux > body text

Linux GNU glibc standard library gethostbyname function buffer overflow vulnerability, does your server have it?

PHPz
Release: 2024-07-21 13:56:39
Original
676 people have browsed it

Linux GNU glibc 标准库 gethostbyname 函数缓冲区溢出漏洞,你的服务器有吗?

Recently, a buffer overflow vulnerability was exposed in the gethostbyname function of the Linux GNUglibc standard library. The affected versions are Glibc2.2 to 2.17, including versions 2.2 and 2.17. If you are using a Linux server, check to see if your Linux server has this vulnerability. The following is a simple Linux glibc version checking technique.

How to check the glibc version in centos using linux find. The following editor will take centos 6.3 of the Linux system as an example to teach you how to check the glibc version.

First use the putty tool to log in to the Linux server, and then type the command: rpm-qa|grepglibc (after completion, press Enter to run), and then you can see the information as shown on the right.

linux查看库函数_达梦数据库查看版本_linux 查看lib库版本

glibc-devel-2.12-1.132.el6.x86_64

glibc-common-2.12-1.132.el6.x86_64

glibc-2.12-1.132.el6.x86_64

linux查看库函数_linux 查看lib库版本_达梦数据库查看版本

glibc-headers-2.12-1.132.el6.x86_64

From the information inside, you can see that 2.12 is the glibc version of centos.

linux 查看lib库版本_达梦数据库查看版本_linux查看库函数

In additionlinux check the lib library versionlinux check the lib library version, you can also check the output result of ls-l/lib/libc.so.6:

[root@Cluster~]#ls-l/lib/libc.so.6

达梦数据库查看版本_linux 查看lib库版本_linux查看库函数

lrwxrwxrwx.1rootroot125月2117:46/lib/libc.so.6->libc-2.12.so

------------------------------------------------- ---

Ubuntu users view the linux shell, please use the command to view: ls-l/lib/i386-linux-gnu/libc.so.6 output:

wzw@wzw-Lenovo:~$ls-l/lib/i386-linux-gnu/libc.so.6

The above is the detailed content of Linux GNU glibc standard library gethostbyname function buffer overflow vulnerability, does your server have it?. For more information, please follow other related articles on the PHP Chinese website!

source:itcool.net
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template
About us Disclaimer Sitemap
php.cn:Public welfare online PHP training,Help PHP learners grow quickly!