Wallix Security Notice (20152901)

A GNU C library vulnerabiltiy allows a remote attacker to gain control on the system.
Realease date: Thursday 29th January 2015


General Information
Synthesis

A vulnerability named Ghost has been found in the GNU C library. Eglibc its Debian implementation is affected.

Indeed it is actually possible to provoke a BufferOverflow in the getbyhostname et getbyhostname2 functions. A remote attacker could execute some arbitrary code to gain total access to the system, without any logins and/or passwords knowledge.


RECOMMANDATION

We strongly advice to download the information and update notice: (valid for all WAB versions)

Installed version

Update

WAB X.x.x

information and update notices


Notice details
Affected versions

Name

Version

AdminBastion

All


Other informations
Technical support

In case of problem, please contact the Wallix Support Team. To get more infos visit https://support.wallix.com.


Disclaimer

The information provided in this advisory is provided “as is” without warranty of any kind. Wallix disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Wallix or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Wallix or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.