VENOM vulnerability also known as QEMU exploit is the most recent vulnerability reported on May 13, 2015 and it is discovered by Jason Geffner while performing a security review of virtual machine hypervisors.
VENOM stands for “Virtualized Environment Neglected Operations Manipulation”.
This venom exploits QEMU, an open source machine emulator. The venom CVE-2015-3456 vulnerability resides in the virtual floppy drive code (FDC) used by the virtualization platforms. If it gets exploited, it allows an attacker to gain full control of the operating system hosting them and as well as on the other guest VMs running on the same host machine.
Failure to mitigate this issue, this exploited virtual machine escape could open access to the host system and all other VMs running on that host, potentially giving elevated access to the host’s local network and adjacent systems running on the network.
Generally, to eliminate the possibility of exploitation, proceed with the following.
To install the updates using the yum package manager, execute the command given below.
To update the QEMU package and its dependencies alone, execute the command given below.
yum update qemu-kvm
PHP: Hypertext Preprocessor has been involving in all of its dynamics in the recent years. In recent times it has involved included and engulfed many of the recent development and api that has been introduced to the computer world especially web developing.
Switching to higher version of PHP is always good but before proceeding the switch we recommend to test the code in the new version and be well satisfied on the code execution.
In this doc we will be taking an overlook on the changes and precaution one should take if your are switching from a lower PHP version to higher PHP version, as below :
Migrating from PHP 5.5.x to PHP 5.6.x
Migrating from PHP 5.4.x to PHP 5.5.x
Migrating from PHP 5.3.x to PHP 5.4.x
Migrating from PHP 5.2.x to PHP 5.3.x
In Linux servers, more than 60 binaries and major services such as SSH, Named, Bash etcrely on the glibc libraries. A heap-based buffer overflow was found in __nss_hostname_digits_dots() and an attacker could use this flaw to execute arbitrary code with the privilege of the users running the application using the function gethostbyname()
Check if your server is GHOST vulnerable
If the glibc version in your server is lower than 2.18, then your server is most exposed to this vulnerability.
You can check the glibc version in your server using the command given below.
#ldd –version (more…)
The Config Server Mail Queue is an addon feature available with cPanel/WHM which provides with a full featured interface to the cPanel exim email queues from within WHM. The addon feature provides with an interface to the cPanel user accounts email configuration without having to login to their accounts. It is domain based rather than account based.
- View, edit and delete email accounts, email forwarders and email filters.
- View and modify email account quotas
- Modify email account passwords
- List only email accounts that are over quota
- Modify Outgoing Mail Hourly Limits
- List only email accounts that are over a specified size
- View the total number of emails in an email account
- Empty an email account
- View emails in an email account
- Individually delete emails in an email account (more…)
CentOS-7 is now powered by version 3.10.0 of the Linux kernel, with advanced support for Linux Containers and XFS (is a high-performance 64-bit journaling file system) as the default file system. It’s also the first version of CentOS to include the systemd management engine, the firewalld dynamic firewall system, and the GRUB2 boot loader.
CentOS 7 supports 64 bit x86 machines. MySQL has been switched with MariaDB.