From: "Lewis Rosenthal" Received: from [107.115.20.98] (account lgrosenthal@2rosenthals.com HELO [127.0.0.1]) by 2rosenthals.com (CommuniGate Pro SMTP 5.4.10) with ESMTPSA id 9153931 for ecs-isp@2rosenthals.com; Mon, 12 Feb 2024 18:27:22 -0500 Date: Mon, 12 Feb 2024 18:27:22 -0500 To: eCS ISP Mailing List Subject: Re: [eCS-ISP] "A vulnerability has been discovered in glibc" User-Agent: K-9 Mail for Android In-Reply-To: References: Message-ID: <6AEFEEB5-37A2-4C56-B9EF-A2AA7557C456@2rosenthals.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Apologies for the top post=2E=2E=2E Assuming an attacker could get in behind the firewall, the defect allows t= he attacker to obtain elevated privs=2E OS/2 is a rooted OS anyway, so priv= a for everyone are already elevated=2E For those of us running OS/2, this appears to be much ado about nothing=2E Watch for a blog post from Arca Noae about this in the near future=2E On February 12, 2024 6:14:45 PM EST, Peter Moylan wrote: >On 13/02/24 09:40, Massimo S=2E wrote: >> Hi all, >>=20 >> this could be a risk for our systems? >>=20 >> thanks >>=20 >> https://www=2Ekaspersky=2Ecom/blog/cve-2023-6246-glibc-vulnerability/50= 369/?reseller=3Dsea_regular-sm_acq_ona_smm__onl_b2b_twi_lnk_sm-team______&u= tm_source=3Dtwitter&utm_medium=3Dsocial&utm_campaign=3Dapac_regular-sm_ab02= 18&utm_content=3Dlink&utm_term=3Dapac_twitter_organic_sfvpg2189o8cjup=20 >>=20 >> short url: >>=20 >> https://is=2Egd/LKBxIt >>=20 >> massimo >>=20 >>=20 > >The attacker must first have access to your system=2E Thus, you should be= safe unless you're allowing remote users to log in using something like SS= H=2E > >I can confirm that my SFTPD does not use glibc=2E > --=20 Lewis