US-CERT: GNU glibc Vulnerability
-------- Forwarded Message --------
Subject: GNU glibc Vulnerability
Date: Wed, 17 Feb 2016 17:04:50 -0600
From: US-CERT <US-CERT@ncas.us-cert.gov>
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
GNU glibc Vulnerability
02/17/2016 05:27 PM ESThttps://www.us-cert.gov/ncas/current-ac ... nerability
Original release date: February 17, 2016
GNU glibc contains a buffer overflow vulnerability in the DNS resolver. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system.
Users and administrators are encouraged to review Vulnerability Note VU#457759 http://www.kb.cert.org/vuls/id/457759
and the glibc https://sourceware.org/ml/libc-alpha/20 ... 00416.html
Project Notification https://sourceware.org/ml/libc-alpha/20 ... 00416.html
for additional details and to refer to their respective Linux or Unix-based OS vendor for an appropriate patch.
This product is provided subject to this Notification and this Privacy & Use policy.
A copy of this publication is available at www.us-cert.gov
. If you need help or have questions, please send an email to email@example.com
. Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT@ncas.us-cert.gov
to your address book.
Contact Us | Security Publications | Alerts and Tips | Related Resources
Sign up for email updates
This email was sent to gerald309xxx using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by GovDelivery
SENDER: gerald309 --
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HELP http://tech.groups.yahoo.com/group/Blue ... CSecurity/
Free Malware Removal Help / A Community Website Since 2005
RSS: https://groups.google.com/forum/feed/pd ... xml?num=15