AIRLINK 196.00 Increased By ▲ 2.44 (1.26%)
BOP 10.20 Increased By ▲ 0.25 (2.51%)
CNERGY 7.87 Decreased By ▼ -0.06 (-0.76%)
FCCL 39.85 Decreased By ▼ -0.80 (-1.97%)
FFL 17.09 Increased By ▲ 0.23 (1.36%)
FLYNG 27.16 Decreased By ▼ -0.59 (-2.13%)
HUBC 134.00 Increased By ▲ 1.42 (1.07%)
HUMNL 14.01 Increased By ▲ 0.12 (0.86%)
KEL 4.76 Increased By ▲ 0.16 (3.48%)
KOSM 6.65 Increased By ▲ 0.03 (0.45%)
MLCF 47.12 Decreased By ▼ -0.48 (-1.01%)
OGDC 214.45 Increased By ▲ 0.54 (0.25%)
PACE 6.81 Decreased By ▼ -0.12 (-1.73%)
PAEL 42.03 Increased By ▲ 0.79 (1.92%)
PIAHCLA 17.20 Increased By ▲ 0.05 (0.29%)
PIBTL 8.50 Increased By ▲ 0.09 (1.07%)
POWER 9.50 Decreased By ▼ -0.14 (-1.45%)
PPL 183.80 Increased By ▲ 1.45 (0.8%)
PRL 42.78 Increased By ▲ 0.82 (1.95%)
PTC 25.10 Increased By ▲ 0.20 (0.8%)
SEARL 110.47 Increased By ▲ 3.63 (3.4%)
SILK 1.00 Increased By ▲ 0.01 (1.01%)
SSGC 44.11 Increased By ▲ 4.01 (10%)
SYM 17.91 Increased By ▲ 0.44 (2.52%)
TELE 8.97 Increased By ▲ 0.13 (1.47%)
TPLP 13.09 Increased By ▲ 0.34 (2.67%)
TRG 67.30 Increased By ▲ 0.35 (0.52%)
WAVESAPP 11.67 Increased By ▲ 0.34 (3%)
WTL 1.84 Increased By ▲ 0.05 (2.79%)
YOUW 4.05 Decreased By ▼ -0.02 (-0.49%)
BR100 12,240 Increased By 195.6 (1.62%)
BR30 36,915 Increased By 335.1 (0.92%)
KSE100 115,562 Increased By 1524.2 (1.34%)
KSE30 36,295 Increased By 500.6 (1.4%)

Red Hat Inc and other makers of the widely used Linux operating system for business computers updated their software on Tuesday to thwart a serious new cyber threat they warned could allow hackers to gain remote control of their systems.
The previously undisclosed vulnerability, dubbed "Ghost," is deemed critical because attackers could exploit it to covertly gain complete control of a targeted Linux system, according to cyber security firm Qualys, which uncovered the bug.
To highlight the severity of the risk, researchers identified a way to craft malicious emails that could automatically compromise a vulnerable server without the email even being opened, said Amol Sarwate, director of engineering with Qualys.
The firm has not released that code and has yet to develop other methods for attacking other types of Linux systems, including servers that run websites.
Sarwate knows of no cases in which hackers exploited the Ghost vulnerability to date, but suspects that motivated hackers could figure out how now that the bug has been disclosed.
"We were able to do it. We think somebody with good security knowledge would also be able to do it," he said.
The vulnerability is caused by a security flaw in the open-source Linux GNU C Library, which is used by Red Hat and other Linux software makers, according to Qualys.
It is called GHOST because it can be triggered by what are known as gethostbyname functions.
Qualys uncovered the bug following discoveries last year of high-profile vulnerabilities, including Heartbleed and Shellshock, which were caused by security flaws in other kinds of widely used open-source software.
"It won't be as widespread as those flaws, but it is widespread enough that IT operations at many companies are scrambling to patch," said Chris Wysopal, chief technology officer of security software firm Veracode.
Red Hat, the No 1 provider of Linux software to businesses, recommends that customers update their systems "as soon as possible to mitigate any potential risk," said company spokeswoman Stephanie Wonderlick.
Other vulnerable software includes some of the Debian, CentOS and Ubuntu versions of Linux, according to Qualys.

Copyright Reuters, 2015

Comments

Comments are closed.