All Servers Patched Against the GLIBC GHOST Vulnerability
Earlier this week a critical vulnerability (CVE-2015-0235) in the Linux GNU C Library (glibc), commonly referred to as the GHOST vulnerability, was announced to the general public. Quite a few clients have contacted us concering the security of their servers and how this vulnerability affects their websites. We therefore want to assure everyone that our server administrators applied patches to all affected servers(shared and dedicated) immediately after we became aware of the vulnerability. Customers with a managed dedicated server have already been notified.
In short, GHOST is a 'buffer overflow' bug affecting the gethostbyname()
and gethostbyname2()
function calls in the glibc library. This vulnerability allows a remote attacker that is able to make an application call to either of these functions to execute arbitrary code with the permissions of the user running the application. Most Linux distributions are vulnerable to this bug, including RHEL 6 & 7, CentOS 6 & 7, Debian 7, and Ubuntu.
At ProperHost security has always been paramount and we are committed to keeping your data safe.