Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2015-0235

Overview

Vulnerability Score 10.0 10.0
CVE Id CVE-2015-0235
Last Modified 09 Oct 2015 10:00:27
Published 28 Jan 2015 02:59:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2015-0235

Summary

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

Vulnerable Systems

Application

  • Gnu Glibc 2.0

  • Gnu Glibc 2.0.1

  • Gnu Glibc 2.0.2

  • Gnu Glibc 2.0.3

  • Gnu Glibc 2.0.4

  • Gnu Glibc 2.0.5

  • Gnu Glibc 2.0.6

  • Gnu Glibc 2.1

  • Gnu Glibc 2.1.1

  • Gnu Glibc 2.1.1.6

  • Gnu Glibc 2.1.2

  • Gnu Glibc 2.1.3

  • Gnu Glibc 2.1.9

  • Gnu Glibc 2.10.1

  • Gnu Glibc 2.11

  • Gnu Glibc 2.11.1

  • Gnu Glibc 2.11.2

  • Gnu Glibc 2.11.3

  • Gnu Glibc 2.12

  • Gnu Glibc 2.12.1

  • Gnu Glibc 2.12.2

  • Gnu Glibc 2.13

  • Gnu Glibc 2.14

  • Gnu Glibc 2.14.1

  • Gnu Glibc 2.15

  • Gnu Glibc 2.16

  • Gnu Glibc 2.17

  • Gnu Glibc 2.2

  • Gnu Glibc 2.2.1

  • Gnu Glibc 2.2.2

  • Gnu Glibc 2.2.3

  • Gnu Glibc 2.2.4

  • Gnu Glibc 2.2.5


References

MISC - https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability

BUGTRAQ - 20150127 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow

BUGTRAQ - 20150127 GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)

CONFIRM - https://www.sophos.com/en-us/support/knowledgebase/121879.aspx

CONFIRM - https://kc.mcafee.com/corporate/index?page=content&id=SB10100

CONFIRM - https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671

CONFIRM - https://bto.bluecoat.com/security-advisory/sa90

CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21695860

CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21695835

CISCO - 20150128 GNU glibc gethostbyname Function Buffer Overflow Vulnerability

SECUNIA - 62715

SECUNIA - 62698

SECUNIA - 62692

SECUNIA - 62691

SECUNIA - 62690

SECUNIA - 62688

SECUNIA - 62681

SECUNIA - 62680

SECUNIA - 62667

SECUNIA - 62640

SECUNIA - 62517

FULLDISC - 20150128 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow

MISC - http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html

CONFIRM - http://linux.oracle.com/errata/ELSA-2015-0092.html

CONFIRM - http://linux.oracle.com/errata/ELSA-2015-0090.html

CONFIRM - http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/

CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21696618

CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21696602

CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21696600

CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21696526

CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21696243

SECUNIA - 62883

SECUNIA - 62879

SECUNIA - 62871

SECUNIA - 62870

SECUNIA - 62865

DEBIAN - DSA-3142

BUGTRAQ - 20150311 OpenSSL v1.0.2 for Linux affected by CVE-2015-0235

REDHAT - RHSA-2015:0126

MISC - http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html

BID - 72325

MANDRIVA - MDVSA-2015:039

HP - SSRT101953

CONFIRM - http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0

MISC - https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt

CONFIRM - http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf

MISC - http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html

HP - SSRT101937

CONFIRM - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

CONFIRM - http://support.apple.com/kb/HT204942

APPLE - APPLE-SA-2015-06-30-2

CONFIRM - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

CONFIRM - https://support.apple.com/HT205267

APPLE - APPLE-SA-2015-09-30-3


Last Updated: 27 May 2016 11:09:17