VN-2015-001 – “GHOST” – CVE-2015-0235

  • 0
  • 1
  • Article
  • Updated 2 years ago
  • (Edited)
Summary
A serious vulnerability has been discovered in two legacy functions that are related to DNS resolution in glibc. Due to the fact that glibc is a fundamental OS component used by many pieces of "userland" software, this vulnerability is a high priority for remediation.

Background (From the CVE Project)

There is a heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18. This allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST.”

Published
2015-01-27

CVSS Severity
10 (from NVD/NIST)

Additional information and product vulnerability status can be found here:
http://learn.extremenetworks.com/rs/extreme/images/VN-2015-001_GHOST_CVE-2015-0235.pdf

The above linked PDF will be updated as we receive more information.
Photo of Drew C.

Drew C., Community Manager

  • 37,364 Points 20k badge 2x thumb

Posted 3 years ago

  • 0
  • 1
Photo of Ronald Dvorak

Ronald Dvorak, Embassador

  • 45,286 Points 20k badge 2x thumb
Photo of Drew C.

Drew C., Community Manager

  • 37,364 Points 20k badge 2x thumb
Ron,  CVE-2015-7547 is a different issue.  It looks like we'll have a first response out later today or tomorrow, which I'll share a link to.  Thanks for asking!

-Drew
Photo of Ronald Dvorak

Ronald Dvorak, Embassador

  • 45,286 Points 20k badge 2x thumb
Drew, any update on that issue ?

Thx,
Ron
Photo of Drew C.

Drew C., Community Manager

  • 37,364 Points 20k badge 2x thumb
Ron, we have published VN-2006-003 to address this new glibc vulnerability.
https://community.extremenetworks.com/extreme/topics/vn-2016-003-glibc-vulnerability-cve-2015-7547
Photo of Ronald Dvorak

Ronald Dvorak, Embassador

  • 45,286 Points 20k badge 2x thumb
Thx