CVE-2015-0235 - GHOST
Vladimir Getmanshchuk
vladget at gmail.com
Wed Jan 28 08:38:45 UTC 2015
JFYI
Here is a list of potential targets that we investigated (they all call
*gethostbyname*, one way or another), but to the best of our knowledge,
the buffer overflow cannot be triggered in any of them:
apache, cups, dovecot, gnupg, isc-dhcp, lighttpd, mariadb/mysql,
nfs-utils, *nginx*, nodejs, openldap, openssh, postfix, proftpd,
pure-ftpd, rsyslog, samba, sendmail, sysklogd, syslog-ng, tcp_wrappers,
vsftpd, xinetd.
http://seclists.org/oss-sec/2015/q1/283
--
Yours sincerely,
Vladimir Getmanshchuk
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nginx.org/pipermail/nginx-ru/attachments/20150128/b2f8705d/attachment-0001.html>
Подробная информация о списке рассылки nginx-ru