Home  >  Article  >  System Tutorial  >  Linux GNU glibc standard library gethostbyname function buffer overflow vulnerability, does your server have it?

Linux GNU glibc standard library gethostbyname function buffer overflow vulnerability, does your server have it?

PHPz
PHPzOriginal
2024-07-21 13:56:39781browse

Linux GNU glibc 标准库 gethostbyname 函数缓冲区溢出漏洞,你的服务器有吗?

Recently, a buffer overflow vulnerability was exposed in the gethostbyname function of the Linux GNUglibc standard library. The affected versions are Glibc2.2 to 2.17, including versions 2.2 and 2.17. If you are using a Linux server, check to see if your Linux server has this vulnerability. The following is a simple Linux glibc version checking technique.

How to check the glibc version in centos using linux find. The following editor will take centos 6.3 of the Linux system as an example to teach you how to check the glibc version.

First use the putty tool to log in to the Linux server, and then type the command: rpm-qa|grepglibc (after completion, press Enter to run), and then you can see the information as shown on the right.

linux查看库函数_达梦数据库查看版本_linux 查看lib库版本

glibc-devel-2.12-1.132.el6.x86_64

glibc-common-2.12-1.132.el6.x86_64

glibc-2.12-1.132.el6.x86_64

linux查看库函数_linux 查看lib库版本_达梦数据库查看版本

glibc-headers-2.12-1.132.el6.x86_64

From the information inside, you can see that 2.12 is the glibc version of centos.

linux 查看lib库版本_达梦数据库查看版本_linux查看库函数

In additionlinux check the lib library versionlinux check the lib library version, you can also check the output result of ls-l/lib/libc.so.6:

[root@Cluster~]#ls-l/lib/libc.so.6

达梦数据库查看版本_linux 查看lib库版本_linux查看库函数

lrwxrwxrwx.1rootroot125月2117:46/lib/libc.so.6->libc-2.12.so

------------------------------------------------- ---

Ubuntu users view the linux shell, please use the command to view: ls-l/lib/i386-linux-gnu/libc.so.6 output:

wzw@wzw-Lenovo:~$ls-l/lib/i386-linux-gnu/libc.so.6

The above is the detailed content of Linux GNU glibc standard library gethostbyname function buffer overflow vulnerability, does your server have it?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn