Data Privacy Alert Vol 13.82 – The GHOST vulnerability – what you need to know

By Michelle Drolet . 5 Feb 2015

The funkily-named bug of the week is GHOST. Its official moniker is the less catchy CVE-2015-0235, and it’s a vulnerability caused by a buffer overflow in a system library that is used in many, if not most, Linux distributions. A buffer overflow is where you assume, for example, that when you handle a four-byte network number written out as … Continue reading Data Privacy Alert Vol 13.82 – The GHOST vulnerability – what you need to know

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

By Michelle Drolet . 29 Sep 2014

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer … Continue reading Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

Tags