Investigating and Troubleshooting CVE-2015-0235 (glibc) Ghost Vulnerability
A potential exploit has been discovered that may allow attackers to execute malicious code across many Linux distributions. The vulnerability in the GNU C Library (glibc) has been assigned CVE-2015-0235 and is being referred to by some as the “Ghost”...
Information on CVE-2015-0235 (GHOST) Vulnerability for Red Hat and CentOS
A vulnerability found in the glibc library, specifically a flaw affecting the gethostbyname() and gethostbyname2() function calls, that allows a remote attacker to potentially execute arbitrary code. CentOS 5, CentOS 6, and CentOS 7 are potentially affected, thus we want...
How to Check the glibc (GNU libc) Version on CentOS 6 and CentOS 7
Pre-Flight Check These instructions are intended specifically for checking the installed version of glibc. I’ll be working from a Liquid Web Core Managed CentOS 6 and CentOS 7 server, and I’ll be logged in as root. Using ldd ldd --version...
How To Update the glibc (GNU libc) in CentOS / Red Hat
Updating glibc on Red Hat Linux or CentOS Linux is a very simple process. Most commonly you will use the following command in the case of a security vulnerability, or perhaps just to verify that you’re running the most up-to-date...
What is CloudLinux?
Reaching a high level of stability can be difficult, sometimes unachievable, for many shared hosting companies. Sudden resource usage spikes, increases in traffic, and hacker attacks are some of the problems system administrators cope with every day. For years, this...
How To Set File Attributes In Linux Using Chattr Command
Chattr is a command used to set / unset file attributes in Linux. Using chattr it is possible to make a file immutable. That is, even a root user will be prohibited from deleting the file.The trick lies in setting the appropriate...
How to fix “exim dead but subsys locked” issue
If you come across the issue “exim dead but subsys locked”. Please try following steps. root@server [/]# /etc/init.d/exim status exim dead but subsys locked If you see this error check for a file named eximdisable in /etc/ If you found the file then...
How To Install and Use Logwatch Log Analyzer and Reporter on a VPS
Introduction Applications create what are called “log files” to keep track of activities taking place at any given time. These files, which are far from being simple text outputs, can be very complex to go through, especially if the server...
How to Back Up and Restore a MySQL Database From Command Line
If you’re storing anything in MySQL databases that you do not want to lose, it is very important to make regular backups of your data to protect it from loss. This tutorial will show you two easy ways to backup and...
Rkhunter Install and Configuration
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong...