Red Hat Product Security has been made aware of a critical vulnerability in the glibc library, which has been assigned CVE-2015-0235 and is commonly referred to as 'GHOST'. All versions of glibc shipped with all variants of Red Hat Enterprise Linux are affected.
Background Information
GHOST is a 'buffer overflow' bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. This vulnerability allows a remote attacker that is able to make an application call to either of these functions to execute arbitrary code with the permissions of the user running the application.
Impact
The gethostbyname() function calls are used for DNS resolving, which is a very common event. To exploit this vulnerability, an attacker must trigger a buffer overflow by supplying an invalid hostname argument to an application that performs a DNS resolution.
Determining Vulnerability
As a Red Hat customer, the easiest way to check for the vulnerability and confirm remediation is the Red Hat Access Lab: glibc (GHOST) Detector.
Resolution
To eliminate the possibility of an exploit:
- Update the
glibcandncsdpackages on your system using the packages released with the following errata: - Restart vulnerable services that use glibc (since so many services use glibc, the safest option is to restart the system).
Comments
We are currently working on and testing errata for RHEL 4, we will post an update for it as soon as it's ready. Thank you for your patience!
Hi,
I'm getting this output when running the detector on RHEL4.
Vulnerable glibc version <= 2.17-54
Vulnerable glibc version <= 2.5-122
Vulnerable glibc version <= 2.12-1.148
Detected glibc version 2.3 revision 4
./ghost.sh: line 21: 10#(2.17) > 10#(2.3): syntax error in expression (error token is "(2.17) > 10#(2.3)")
./ghost.sh: line 25: 10#(2.17) < 10#(2.3): syntax error in expression (error token is "(2.17) < 10#(2.3)")
This system is vulnerable to CVE-2015-0235. https://access.redhat.com/security/cve/CVE-2015-0235 Please refer to https://access.redhat.com/articles/1332213 for remediation steps
Or did I anything wrong?