In general, here's what it's about :
"Summary
GNU C library (glibc) vulnerability that has been referred to as GHOST affects DS8000
Description:
The gethostbyname functions of the GNU C Library (glibc) are vulnerable to a buffer overflow. By sending a specially crafted, but valid hostname argument, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the targeted process or cause the process to crash. The impact of an attack depends on the implementation details of the targeted application or operating system. This issue is being referred to as the "Ghost" vulnerability."
For more information and fixes, please refer to the appropriate flashes.
For DS8000 : link.
For XIV Gen2 : link.
For XIV Gen3 : link.
No comments:
Post a Comment