Well not so much of a 0-Day since this bug was discovered and slowly patched almost 2 years ago. This exploit can allow malicious user to allow remote code execution to a full compromise. So just make sure you are running a version of GLIBC above 2.17. More info on the link below. Also props to that company for working with all the vendor years in advance and still not releasing a POF (proof of concept).
--
You received this message because you are subscribed to the Google Groups "Akron Linux Users Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to akronlug+u...@googlegroups.com.
To post to this group, send email to akro...@googlegroups.com.
Visit this group at http://groups.google.com/group/akronlug.
For more options, visit https://groups.google.com/d/optout.