Katabat (formerly CMC) Responds to “GHOST” Vulnerability (CVE-2015-0235)

A note from Katabat Director of Information Security, Arthur Haigh

Wilmington, DE, January 28, 2015 – On Tuesday, January 27th, a critical vulnerability affecting all variants of the Linux operating system was announced (Linux Ghost Remote Code Execution Vulnerability US-CERT). The risk of exploitation on Katabat (formerly CMC Agile) systems is low.

This vulnerability, CVE-2015-0235, is being referred to as the GHOST vulnerability. If exploited attackers could use this flaw to execute code and remotely gain control of Linux machines. Risk to Katabat systems is low as Katabat has multiple compensating controls and defenses in place to prevent unauthorized access to our systems and prevent exploitation of this vulnerability. Despite this, Katabat engineers have already begun applying the patch to affected systems. We will continue this patching effort with the highest priority, while minimizing the client-facing impact to our software and services.

For further information about Katabat’s capabilities, please contact your Katabat (formerly CMC Agile) Account Manager directly or via clientservices@katabat.com or Joel Rickman via jrickman@katabat.com

=

Katabat is the leading provider of debt collections software to banks, agencies, and alternative lenders. Founded in 2006 and led by a diverse team of lending executives and leading software engineers, Katabat pioneered digital collections and has led the industry ever since. It is our mission to provide the best credit collections software in the market and solve debt resolution from the perspectives of both lenders and borrowers.

More from

Get the Latest Accounts Receivable News, Insights and Best Practices from Katabat Delivered to Your Inbox

We respect your privacy and your inbox. We’ll only send you timely content that matters most. And you can always unsubscribe at any time.

Request a Demo

Are you interested in learning more about the Katabat platform? Schedule a demo today.