All you need to know about the 'GHOST' vulnerability

If you suspect that your server is attacked successfully, remove the server from operation immediately, plug out all network connections and execute your emergency plan. Do you have plans for such scenarios? You should... If you do not have such an emergency plan then maybe the easiest and most secure way is to reinstall the whole system.

5. Are my Linux servers safe now?

  • - Is there a faster way to deploy security fixes?
  • - Is there any unnecessary/unused service that you can shut down to minimize attack surface?
  • - Is there any setting, functionality of any currently used software that you can switch off?
  • - Are you subscribed to security advisory alerts? Did you receive "GHOST" alerts in time?
  • - Is anybody watching security alerts 24/7 to take all necessary steps immediately when needed?

7. What should I do as an Internet user?

You cannot do much. You are unlikely to be affected by this vulnerability. There is a very small chance that an attacker could send you a fake email or catch your email via a hacked email server or access your personal information stored on a hacked server but the probability is low enough that you should not be worried.

  • Szilard Stange is director of product management at OPSWAT
TOPICS