<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US">Bonjour,</span></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US"><br></span></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US">il semblerait qu'une vulnérabilités grave dans glibc permette à un attaquant de pirater à distance tout linux.</span></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US"><br></span></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US">Tenez vous prêt pour les mise à jour.</span></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US">Surveillez les connections depuis ou vers des adresses inhabituels sur vos machine exposé sur internet.</span></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US"><br></span></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US">Vous trouverez plus de détails si dessous:</span></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US"><br></span></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US">The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials.<span class="apple-converted-space"> </span></span><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"><span lang="EN-US" style="border: 1pt none windowtext; padding: 0cm;">CVE-2015-0235</span></a><span class="apple-converted-space"><span lang="EN-US"> </span></span><span lang="EN-US">has been assigned to this issue.<o:p></o:p></span></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline; min-height: 8pt;"><span lang="EN-US" style="background-color: rgba(255, 255, 255, 0);"> <o:p></o:p></span></p><p style="margin: 0cm 0cm 0.0001pt; vertical-align: baseline;"><span style="background-color: rgba(255, 255, 255, 0);"><span lang="EN-US">Qualys security researchers discovered this bug and worked closely with Linux distribution vendors. And as a result of that we are releasing<span class="apple-converted-space"> </span></span><a href="https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt"><span lang="EN-US" style="border: 1pt none windowtext; padding: 0cm;">this advisory</span></a><span class="apple-converted-space"><span lang="EN-US"> </span></span><span lang="EN-US">today as a co-ordinated effort, and patches for all distribution are available January 27, 2015.<o:p></o:p></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0.0001pt;"><span lang="EN-US" style="background-color: rgba(255, 255, 255, 0);"> </span></p><p class="MsoNormal" style="margin: 0cm 0cm 0.0001pt;"><span lang="EN-US" style="background-color: rgba(255, 255, 255, 0);"><a href="https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability">https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability</a></span></p><br></div></body></html>