Ask the Community
Groups
CVE-2015-0235: GHOST glibc vulnerability - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2015-0235</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p></p> <p>GHOST is a 'buffer overflow' bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. This vulnerability allows a remote attacker that is able to make an application call to either of these functions to execute arbitrary code with the permissions of the user running the application. (published 01/27/2015)<br><br>Unitrends risk assessment: Severity High<br><br>Although the gethostbyname function is deprecated, it is likely that at least one of the running Linux services uses this function. The updated glibc library rpms should be installed.</p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p></p> <p>Fixed in CentOS update repo versions:</p> <ul><li> <p>glibc-2.5-123.el5_11.1 for CentOS5</p> </li> <li> <p>glibc-2.12-1.149.el6_6.5 for CentOS6</p> </li> </ul><p>To update to the new version of glibc with the fix, either do 'yum update glibc' from the command line, or perform an update from the UI (as of 01/29/2015).</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Farticles%2F1332213%250D%250Ahttps%3A%2F%2Frhn.redhat.com%2Ferrata%2FRHSA-2015-0090.html%250D%250Ahttp%3A%2F%2Fwww.openwall.com%2Flists%2Foss-security%2F2015%2F01%2F27%2F9%250D%250Ahttps%3A%2F%2Fcommunity.qualys.com%2Fblogs%2Flaws-of-vulnerabilities%2F2015%2F01%2F27%2Fthe-ghostvulnerability">https://access.redhat.com/articles/1332213 https://rhn.redhat.com/errata/RHSA-2015-0090.html http://www.openwall.com/lists/oss-security/2015/01/27/9 https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghostvulnerability</a></li></ul> </article> </main>