Glibc: GHOST Vulnerability Test To See If a Linux Sever Is Secure

https‮:‬//www.lautturi.com
Glibc: GHOST Vulnerability Test To See If a Linux Sever Is Secure

The GHOST (CVE-2015-0235) vulnerability is a serious vulnerability that affects the glibc library, which is a core part of the Linux operating system. This vulnerability allows an attacker to execute arbitrary code with the permissions of the user running the affected software, potentially allowing the attacker to take control of the system.

To test if a Linux server is vulnerable to the GHOST vulnerability, you can use the GHOST.c test program provided by Red Hat. This program is designed to test if a system is vulnerable to the GHOST vulnerability by attempting to exploit it.

To use the GHOST.c test program, you will need to compile it first. You can do this by running the following commands:

wget https://www.qualys.com/apps/pdf/GHOST.c
gcc GHOST.c -o GHOST

This will download the GHOST.c file and compile it into an executable program called GHOST.

To test if your system is vulnerable, simply run the GHOST program:

./GHOST

If your system is vulnerable, the GHOST program will display a message indicating that the vulnerability has been successfully exploited. If your system is not vulnerable, the GHOST program will exit without displaying any message.

It is important to note that the GHOST test program should only be used for testing purposes, as it may cause system instability if the vulnerability is successfully exploited. If you have determined that your system is vulnerable to the GHOST vulnerability, you should apply the appropriate security updates as soon as possible to protect your system from potential attacks.

Created Time:2017-10-28 20:40:39  Author:lautturi