<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Feb 3, 2015 at 4:53 AM, Rustom Mody <span dir="ltr"><<a href="mailto:rustompmody@gmail.com" target="_blank">rustompmody@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">How many people (actually machines) out here are vulnerable?<br>
<br>
<a href="http://security.stackexchange.com/questions/80210/ghost-bug-is-there-a-simple-way-to-test-if-my-system-is-secure" target="_blank">http://security.stackexchange.com/questions/80210/ghost-bug-is-there-a-simple-way-to-test-if-my-system-is-secure</a><br>
<br>
shows a python 1-liner to check<br>
<span class=""><font color="#888888">--<br>
<a href="https://mail.python.org/mailman/listinfo/python-list" target="_blank">https://mail.python.org/mailman/listinfo/python-list</a><br>
</font></span></blockquote></div><br><br clear="all"><div><br></div><div>Not very reliable in my experience,</div><div><br></div><div>this python test does segfault on my *patched* Debian machine</div><div><br></div><div><div>root@web:~# python -c 'import socket;y="0"*50000000;socket.gethostbyname(y)'</div><div>Segmentation fault</div></div><div><div><br></div><div>However, the other test proposed on stackechange correctly reports that I'm not vulnerable ;) </div><div>root@web:/tmp# wget <a href="https://webshare.uchicago.edu/orgs/ITServices/itsec/Downloads/GHOST.c">https://webshare.uchicago.edu/orgs/ITServices/itsec/Downloads/GHOST.c</a></div><div>root@web:/tmp# gcc GHOST.c -o GHOST<br></div><div>root@web:/tmp# ./GHOST </div><div>not vulnerable</div></div><div><br></div><div><br></div>-- <br><div class="gmail_signature">Marc</div>
</div></div>