Updated glibc packages that fix a security flaw in the resolver as well as dlclose handling are now available.
The GNU libc packages (known as glibc) contain the standard C libraries used by applications. A security audit of the glibc packages in CentOS Linux 2.1 found a flaw in the resolver library which was originally reported as affecting versions of ISC BIND 4.9. This flaw also applied to glibc versions before 2.3.2. An attacker who is able to send DNS responses (perhaps by creating a malicious DNS server) could remotely exploit this vulnerability to execute arbitrary code or cause a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0029 to this issue. These updated packages also fix a dlclose function bug on certain shared libraries, which caused program crashes. All users of glibc should upgrade to these updated packages, which resolve these issues.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center