First published: Wed Jan 28 2015(Updated: )
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library | >=2.0<2.18 | |
Oracle Communications Application Session Controller | <3.7.1 | |
Oracle Communications Eagle | =16.0 | |
Oracle Communications EAGLE local number portability Application Processor | =10.0 | |
Oracle Communications LSMS | =13.1 | |
Oracle Communications Policy Management | =9.7.3 | |
Oracle Communications Policy Management | =9.9.1 | |
Oracle Communications Policy Management | =10.4.1 | |
Oracle Communications Policy Management | =11.5 | |
Oracle Communications Policy Management | =12.1.1 | |
Oracle Communications Session Border Controller | <7.2.0 | |
Oracle Communications Session Border Controller | =7.2.0 | |
Oracle Communications Session Border Controller | =8.0.0 | |
Oracle Communications User Data Repository | >=10.0.0<=10.0.1 | |
Oracle WebRTC Session Controller | =7.0 | |
Oracle WebRTC Session Controller | =7.1 | |
Oracle WebRTC Session Controller | =7.2 | |
Oracle Exalogic Infrastructure | =1.0 | |
Oracle Exalogic Infrastructure | =2.0 | |
Oracle VM VirtualBox | <5.1.24 | |
Oracle Linux | =5 | |
Oracle Linux | =7-0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Red Hat Enterprise Virtualization | =6.0 | |
Apple iOS and macOS | <10.11.1 | |
IBM PureApplication System | =1.0.0.0 | |
IBM PureApplication System | =1.1.0.0 | |
IBM PureApplication System | =2.0.0.0 | |
IBM Security Access Manager for Enterprise Single Sign-On | =8.2 | |
PHP | >=5.4.0<5.4.38 | |
PHP | >=5.5.0<5.5.22 | |
PHP | >=5.6.0<5.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0235 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2015-0235, upgrade glibc to version 2.18 or later, or apply the relevant patches for affected software.
CVE-2015-0235 affects various versions of the GNU C Library (glibc) and specific Oracle applications running versions prior to the patched releases.
CVE-2015-0235 can be exploited by attackers using functions like gethostbyname or gethostbyname2 to execute arbitrary code.
CVE-2015-0235 remains a potential threat for systems that have not been updated or patched since the vulnerability was disclosed.