// For flags

CVE-2015-0235

Exim GHOST (glibc gethostbyname) Buffer Overflow

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

21
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

Desbordamiento de buffer basado en memoria dinámica en la función __nss_hostname_digits_dots en glibc 2.2, y otras versiones 2.x anteriores a 2.18, permite a atacantes dependientes de contexto ejecutar código arbitrario a través de vectores relacionados con la funciín (1) gethostbyname o (2) gethostbyname2, también conocido como 'GHOST.'

A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.

The industrial managed switch series 852 from WAGO is affected by multiple vulnerabilities such as old software components embedded in the firmware. Furthermore, hardcoded password hashes and credentials were also found by doing an automated scan with IoT Inspector.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-11-18 CVE Reserved
  • 2015-01-27 CVE Published
  • 2015-01-27 First Exploit
  • 2024-07-24 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-122: Heap-based Buffer Overflow
  • CWE-787: Out-of-bounds Write
CAPEC
References (102)
URL Tag Source
http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux Third Party Advisory
http://linux.oracle.com/errata/ELSA-2015-0090.html Third Party Advisory
http://linux.oracle.com/errata/ELSA-2015-0092.html Third Party Advisory
http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html Third Party Advisory
http://seclists.org/fulldisclosure/2015/Jan/111 Mailing List
http://seclists.org/oss-sec/2015/q1/269 Mailing List
http://secunia.com/advisories/62517 Not Applicable
http://secunia.com/advisories/62640 Not Applicable
http://secunia.com/advisories/62667 Not Applicable
http://secunia.com/advisories/62680 Not Applicable
http://secunia.com/advisories/62681 Not Applicable
http://secunia.com/advisories/62688 Not Applicable
http://secunia.com/advisories/62690 Not Applicable
http://secunia.com/advisories/62691 Not Applicable
http://secunia.com/advisories/62692 Not Applicable
http://secunia.com/advisories/62698 Not Applicable
http://secunia.com/advisories/62715 Not Applicable
http://secunia.com/advisories/62758 Not Applicable
http://secunia.com/advisories/62812 Not Applicable
http://secunia.com/advisories/62813 Not Applicable
http://secunia.com/advisories/62816 Not Applicable
http://secunia.com/advisories/62865 Not Applicable
http://secunia.com/advisories/62870 Not Applicable
http://secunia.com/advisories/62871 Not Applicable
http://secunia.com/advisories/62879 Not Applicable
http://secunia.com/advisories/62883 Not Applicable
http://support.apple.com/kb/HT204942 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21695695 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21695774 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21695835 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21695860 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21696131 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21696243 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21696526 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21696600 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21696602 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21696618 Third Party Advisory
http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf Broken Link
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html Third Party Advisory
http://www.securityfocus.com/bid/72325 Third Party Advisory
http://www.securityfocus.com/bid/91787 Third Party Advisory
http://www.securitytracker.com/id/1032909 Third Party Advisory
https://bto.bluecoat.com/security-advisory/sa90 Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf Third Party Advisory
https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability Third Party Advisory
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668 Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes Third Party Advisory
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671 Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10100 Third Party Advisory
https://security.netapp.com/advisory/ntap-20150127-0001 Third Party Advisory
https://support.apple.com/HT205267 Third Party Advisory
https://support.apple.com/HT205375 Third Party Advisory
https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9 Third Party Advisory
https://www.f-secure.com/en/web/labs_global/fsc-2015-1 Third Party Advisory
https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt Third Party Advisory
https://www.sophos.com/en-us/support/knowledgebase/121879.aspx Third Party Advisory
http://r-7.co/1CAnMc0
URL Date SRC
https://www.exploit-db.com/exploits/35951 2015-01-29
https://www.exploit-db.com/exploits/36421 2015-03-18
https://github.com/aaronfay/CVE-2015-0235-test 2015-01-29
https://github.com/makelinux/CVE-2015-0235-workaround 2015-02-04
https://github.com/sUbc0ol/CVE-2015-0235 2017-06-30
https://github.com/mikesplain/CVE-2015-0235-cookbook 2015-01-27
https://github.com/tobyzxj/CVE-2015-0235 2015-01-30
https://github.com/adherzog/ansible-CVE-2015-0235-GHOST 2015-01-28
http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html 2024-08-06
http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html 2024-08-06
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html 2024-08-06
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html 2024-08-06
http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html 2024-08-06
http://seclists.org/fulldisclosure/2019/Jun/18 2024-08-06
http://seclists.org/fulldisclosure/2021/Sep/0 2024-08-06
http://seclists.org/fulldisclosure/2022/Jun/36 2024-08-06
http://seclists.org/oss-sec/2015/q1/274 2024-08-06
http://www.openwall.com/lists/oss-security/2021/05/04/7 2024-08-06
http://www.securityfocus.com/archive/1/534845/100/0/threaded 2024-08-06
https://seclists.org/bugtraq/2019/Jun/14 2024-08-06
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/smtp/exim_gethostbyname_bof.rb 2015-01-27
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
>= 2.0 < 2.18
Search vendor "Gnu" for product "Glibc" and version " >= 2.0 < 2.18"
-
Affected
Oracle
Search vendor "Oracle"
Communications Application Session Controller
Search vendor "Oracle" for product "Communications Application Session Controller"
< 3.7.1
Search vendor "Oracle" for product "Communications Application Session Controller" and version " < 3.7.1"
-
Affected
Oracle
Search vendor "Oracle"
Communications Eagle Application Processor
Search vendor "Oracle" for product "Communications Eagle Application Processor"
16.0
Search vendor "Oracle" for product "Communications Eagle Application Processor" and version "16.0"
-
Affected
Oracle
Search vendor "Oracle"
Communications Eagle Lnp Application Processor
Search vendor "Oracle" for product "Communications Eagle Lnp Application Processor"
10.0
Search vendor "Oracle" for product "Communications Eagle Lnp Application Processor" and version "10.0"
-
Affected
Oracle
Search vendor "Oracle"
Communications Lsms
Search vendor "Oracle" for product "Communications Lsms"
13.1
Search vendor "Oracle" for product "Communications Lsms" and version "13.1"
-
Affected
Oracle
Search vendor "Oracle"
Communications Policy Management
Search vendor "Oracle" for product "Communications Policy Management"
9.7.3
Search vendor "Oracle" for product "Communications Policy Management" and version "9.7.3"
-
Affected
Oracle
Search vendor "Oracle"
Communications Policy Management
Search vendor "Oracle" for product "Communications Policy Management"
9.9.1
Search vendor "Oracle" for product "Communications Policy Management" and version "9.9.1"
-
Affected
Oracle
Search vendor "Oracle"
Communications Policy Management
Search vendor "Oracle" for product "Communications Policy Management"
10.4.1
Search vendor "Oracle" for product "Communications Policy Management" and version "10.4.1"
-
Affected
Oracle
Search vendor "Oracle"
Communications Policy Management
Search vendor "Oracle" for product "Communications Policy Management"
11.5
Search vendor "Oracle" for product "Communications Policy Management" and version "11.5"
-
Affected
Oracle
Search vendor "Oracle"
Communications Policy Management
Search vendor "Oracle" for product "Communications Policy Management"
12.1.1
Search vendor "Oracle" for product "Communications Policy Management" and version "12.1.1"
-
Affected
Oracle
Search vendor "Oracle"
Communications Session Border Controller
Search vendor "Oracle" for product "Communications Session Border Controller"
< 7.2.0
Search vendor "Oracle" for product "Communications Session Border Controller" and version " < 7.2.0"
-
Affected
Oracle
Search vendor "Oracle"
Communications Session Border Controller
Search vendor "Oracle" for product "Communications Session Border Controller"
7.2.0
Search vendor "Oracle" for product "Communications Session Border Controller" and version "7.2.0"
-
Affected
Oracle
Search vendor "Oracle"
Communications Session Border Controller
Search vendor "Oracle" for product "Communications Session Border Controller"
8.0.0
Search vendor "Oracle" for product "Communications Session Border Controller" and version "8.0.0"
-
Affected
Oracle
Search vendor "Oracle"
Communications User Data Repository
Search vendor "Oracle" for product "Communications User Data Repository"
>= 10.0.0 <= 10.0.1
Search vendor "Oracle" for product "Communications User Data Repository" and version " >= 10.0.0 <= 10.0.1"
-
Affected
Oracle
Search vendor "Oracle"
Communications Webrtc Session Controller
Search vendor "Oracle" for product "Communications Webrtc Session Controller"
7.0
Search vendor "Oracle" for product "Communications Webrtc Session Controller" and version "7.0"
-
Affected
Oracle
Search vendor "Oracle"
Communications Webrtc Session Controller
Search vendor "Oracle" for product "Communications Webrtc Session Controller"
7.1
Search vendor "Oracle" for product "Communications Webrtc Session Controller" and version "7.1"
-
Affected
Oracle
Search vendor "Oracle"
Communications Webrtc Session Controller
Search vendor "Oracle" for product "Communications Webrtc Session Controller"
7.2
Search vendor "Oracle" for product "Communications Webrtc Session Controller" and version "7.2"
-
Affected
Oracle
Search vendor "Oracle"
Exalogic Infrastructure
Search vendor "Oracle" for product "Exalogic Infrastructure"
1.0
Search vendor "Oracle" for product "Exalogic Infrastructure" and version "1.0"
-
Affected
Oracle
Search vendor "Oracle"
Exalogic Infrastructure
Search vendor "Oracle" for product "Exalogic Infrastructure"
2.0
Search vendor "Oracle" for product "Exalogic Infrastructure" and version "2.0"
-
Affected
Oracle
Search vendor "Oracle"
Vm Virtualbox
Search vendor "Oracle" for product "Vm Virtualbox"
< 5.1.24
Search vendor "Oracle" for product "Vm Virtualbox" and version " < 5.1.24"
-
Affected
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
5
Search vendor "Oracle" for product "Linux" and version "5"
-
Affected
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
7
Search vendor "Oracle" for product "Linux" and version "7"
0
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
7.0
Search vendor "Debian" for product "Debian Linux" and version "7.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Redhat
Search vendor "Redhat"
Virtualization
Search vendor "Redhat" for product "Virtualization"
6.0
Search vendor "Redhat" for product "Virtualization" and version "6.0"
-
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
< 10.11.1
Search vendor "Apple" for product "Mac Os X" and version " < 10.11.1"
-
Affected
Ibm
Search vendor "Ibm"
Pureapplication System
Search vendor "Ibm" for product "Pureapplication System"
1.0.0.0
Search vendor "Ibm" for product "Pureapplication System" and version "1.0.0.0"
-
Affected
Ibm
Search vendor "Ibm"
Pureapplication System
Search vendor "Ibm" for product "Pureapplication System"
1.1.0.0
Search vendor "Ibm" for product "Pureapplication System" and version "1.1.0.0"
-
Affected
Ibm
Search vendor "Ibm"
Pureapplication System
Search vendor "Ibm" for product "Pureapplication System"
2.0.0.0
Search vendor "Ibm" for product "Pureapplication System" and version "2.0.0.0"
-
Affected
Ibm
Search vendor "Ibm"
Security Access Manager For Enterprise Single Sign-on
Search vendor "Ibm" for product "Security Access Manager For Enterprise Single Sign-on"
8.2
Search vendor "Ibm" for product "Security Access Manager For Enterprise Single Sign-on" and version "8.2"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
>= 5.4.0 < 5.4.38
Search vendor "Php" for product "Php" and version " >= 5.4.0 < 5.4.38"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
>= 5.5.0 < 5.5.22
Search vendor "Php" for product "Php" and version " >= 5.5.0 < 5.5.22"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
>= 5.6.0 < 5.6.6
Search vendor "Php" for product "Php" and version " >= 5.6.0 < 5.6.6"
-
Affected