{"id":2315,"date":"2015-01-27T16:48:51","date_gmt":"2015-01-27T15:48:51","guid":{"rendered":"https:\/\/www.digdeo.fr\/?p=2315"},"modified":"2022-03-16T12:22:28","modified_gmt":"2022-03-16T11:22:28","slug":"faille-cve-2015-0235-glibc-ghost-linux","status":"publish","type":"post","link":"https:\/\/www.digdeo.fr\/articles\/securite\/faille-cve-2015-0235-glibc-ghost-linux","title":{"rendered":"Faille CVE-2015-0235 glibc GHOST Linux"},"content":{"rendered":"\n<p>Ce jour une importante faille de s\u00e9curit\u00e9 affectant tous les syst\u00e8mes embarquant la librairie C glibc a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9e.<\/p>\n\n\n\n<p>La faiblesse vient des fonctions gethostbyname et gethostbyaddr qui permet de r\u00e9soudre un enregistrement DNS ex www.domaine.com en une adresse IP, elle permet de pouvoir ex\u00e9cuter \u00e0 distance un ex\u00e9cutable sous l&rsquo;identit\u00e9 du logiciel faillible \u00e0 cette version de la glibc.<\/p>\n\n\n\n\n\n\n\n<h2 class=\"wp-block-heading\">Plan de mise \u00e0 jour des serveurs suite \u00e0 une faille<\/h2>\n\n\n\n<p>La faille a \u00e9t\u00e9 d\u00e9voil\u00e9e \u00e0 15h30 et moins d&rsquo;1h45 le temps que les patchs soient distribu\u00e9s, l&rsquo;ensemble des serveurs que nous g\u00e9rons pour nos clients sont \u00e0 jour.<\/p>\n\n\n\n<p>Pour plus d&rsquo;informations sur la faille du c\u00f4t\u00e9 de chez Debian :<\/p>\n\n\n\n<p><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2015-0235\" rel=\"nofollow\">https:\/\/security-tracker.debian.org\/tracker\/CVE-2015-0235<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Faille critique pour les syst\u00e8mes embarquant la GNU\/libc nomm\u00e9e GHOST, cette faille porte l&rsquo;identifiant CVE-2015-0235. Toutes les syst\u00e8mes embarquant une librairie glibc depuis les ann\u00e9es 2000 sont vuln\u00e9rables.<\/p>\n","protected":false},"author":2,"featured_media":3051,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[36],"class_list":["post-2315","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","tag-securite"],"_links":{"self":[{"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/posts\/2315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/comments?post=2315"}],"version-history":[{"count":1,"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/posts\/2315\/revisions"}],"predecessor-version":[{"id":3052,"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/posts\/2315\/revisions\/3052"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/media\/3051"}],"wp:attachment":[{"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/media?parent=2315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/categories?post=2315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digdeo.fr\/articles\/wp-json\/wp\/v2\/tags?post=2315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}