Wallix Security Notice (20152901)

A GNU C library vulnerabiltiy allows a remote attacker to gain control on the system.
Realease date: Thursday 29th January 2015

General Information

A vulnerability named Ghost has been found in the GNU C library. Eglibc its Debian implementation is affected.

Indeed it is actually possible to provoke a BufferOverflow in the getbyhostname et getbyhostname2 functions. A remote attacker could execute some arbitrary code to gain total access to the system, without any logins and/or passwords knowledge.


We strongly advice to download the information and update notice: (valid for all WAB versions)

Installed version


WAB X.x.x

information and update notices

Notice details
Affected versions





Other informations
Technical support

In case of problem, please contact the Wallix Support Team. To get more infos visit https://support.wallix.com.


The information provided in this advisory is provided “as is” without warranty of any kind. Wallix disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Wallix or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Wallix or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.