10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%
The __nss_hostname_digits_dots()
function of the GNU C Library (glibc) allows a buffer overflow condition in which arbitrary code may be executed. This vulnerability has been assigned CVE-2015-0235, and is referred to in the media by the name “GHOST”.
According to Qualys, the vulnerability is “a buffer overflow in the __nss_hostname_digits_dots()
function of the GNU C Library (glibc
). This bug is reachable both locally and remotely via the gethostbyname*()
functions” and furthermore, “arbitrary code execution can be achieved” by use of the buffer overflow.
All versions of glibc
from glibc-2.2
(released 2010-11-10) until glibc-2.17
are vulnerable. The vulnerability was patched on 2013-05-21, prior to the release of glibc-2.18
.
For more details, please see the full Qualys Security Advisory.
The __nss_hostname_digits_dots()
function allows a buffer overflow condition in which arbitrary code may be executed. The impact may vary depending on if the use case is local or remote.
Apply an update
Affected users may apply a patch or update to glibc-2.18``
or later. The Vendor Status information below provides more information on updates.
Some older, no longer supported versions of linux distributions may contain an older version of glibc that is vulnerable. Please check with your vendor to find out if you need to upgrade to a newer operating system in order to address this issue.
967332
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: January 28, 2015 Updated: January 30, 2015
Statement Date: January 28, 2015
Affected
“Arch Linux is not vulnerable. [Arch Linux is] on a modern version of glibc so [Arch Linux] should have been safe for 18+ months.
”
We are not aware of further vendor information regarding this vulnerability.
If using an edition of Arch Linux older than about 18 months, you may wish to check with the vendor to find out if you need to upgrade.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23967332 Feedback>).
Updated: January 30, 2015
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: January 30, 2015
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: January 30, 2015
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 28, 2015 Updated: January 28, 2015
Statement Date: January 28, 2015
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: January 30, 2015
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 28, 2015 Updated: January 30, 2015
Statement Date: January 29, 2015
Affected
"Our most recent glibc packages are not affected; we’ll be issuing an
advisory anyway to inform users who may still have older versions installed."
We are not aware of further vendor information regarding this vulnerability.
Updated: January 30, 2015
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: October 22, 2015
Affected
“We provide information on this issue at the following URL: <<http://jpn.nec.com/security-info/secinfo/nv15-007.html>> (only in Japanese).”
We are not aware of further vendor information regarding this vulnerability.
Updated: January 30, 2015
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 28, 2015 Updated: January 30, 2015
Statement Date: January 29, 2015
Affected
“Openwall GNU/*/Linux (Owl) was affected, although there's no known attack vector that would expose the glibc bug as a vulnerability in an install of Owl with no third-party software. We have released glibc updates for Owl 3.1-stable and Owl-current on 2015/01/28.
”
We are not aware of further vendor information regarding this vulnerability.
Notified: January 28, 2015 Updated: January 30, 2015
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 28, 2015 Updated: January 28, 2015
Statement Date: January 28, 2015
Affected
"`SUSE Linux Enterprise 11 and older are affected by the problem. We released
updates
for all supported and affected codestreams.
SUSE Linux Enterprise 12 is not affected by this problem.`"
We are not aware of further vendor information regarding this vulnerability.
Notified: January 28, 2015 Updated: January 28, 2015
Statement Date: January 28, 2015
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 28, 2015 Updated: January 28, 2015
Statement Date: January 28, 2015
Affected
“Ubuntu 10.04 LTS (lucid) and Ubuntu 12.04 LTS (precise) were affected; Ubuntu 14.04 LTS and newer releases were not, as they included versions of the GNU C Library that already contained the upstream fix.
”
We are not aware of further vendor information regarding this vulnerability.
Notified: January 28, 2015 Updated: January 30, 2015
Statement Date: January 28, 2015
Affected
“openSUSE 13.1 and 13.2 are not affected by the problem.
”
We are not aware of further vendor information regarding this vulnerability.
Older versions of openSUSE may be affected. Check with the vendor to see if you require an upgrade.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23967332 Feedback>).
Notified: January 28, 2015 Updated: January 28, 2015
Statement Date: January 28, 2015
Not Affected
“Contiki OS does not use the GNU libc resolver functions so is not affected by this.
”
We are not aware of further vendor information regarding this vulnerability.
Notified: January 28, 2015 Updated: January 28, 2015
Unknown
We have not received a statement from the vendor.
Notified: January 28, 2015 Updated: January 28, 2015
Unknown
We have not received a statement from the vendor.
Notified: January 28, 2015 Updated: January 28, 2015
Unknown
We have not received a statement from the vendor.
Notified: January 28, 2015 Updated: January 28, 2015
Unknown
We have not received a statement from the vendor.
Notified: January 28, 2015 Updated: January 28, 2015
Unknown
We have not received a statement from the vendor.
Notified: January 28, 2015 Updated: January 28, 2015
Unknown
We have not received a statement from the vendor.
Notified: January 28, 2015 Updated: January 28, 2015
Unknown
We have not received a statement from the vendor.
Notified: January 28, 2015 Updated: January 28, 2015
Unknown
We have not received a statement from the vendor.
Notified: January 28, 2015 Updated: January 28, 2015
Unknown
We have not received a statement from the vendor.
View all 26 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 7.8 | E:POC/RL:OF/RC:C |
Environmental | 5.9 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
Credit to Qualys for discovering the vulnerability.
This document was written by Garret Wassermann.
CVE IDs: | CVE-2015-0235 |
---|---|
Date Public: | 2015-01-28 Date First Published: |