GHOST is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. This vulnerability allows a remote attacker that is able to make an application call to either of these functions to execute arbitrary code with the permissions of the user running the application. You can find more information by searching “Ghost Vulnerability” or check these few links below
- Highly critical “Ghost” allowing code execution affects most Linux systems
- Scary ‘Ghost’ vulnerability leaves Linux systems vulnerable to possession
- GHOST, a critical Linux security hole, is revealed
Most of the hosting servers uses linux as their opertaing systems. This has made them prone to this hacking. We recommend updating with your administrator & upgrading the servers ASAP. Business hosted with us are secured as we have completed the upgrade.
Do check our latest Small Business Website packages which now comes with the Hosting