GHOST is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. If a remote attacker can make an application call to gethostbyname() or gethostbyname2(), this vulnerability allows the remote attacker to execute arbitrary code with the permissions of the user running the application.

GHOST was originally published by Red Hat as CVE-2015-0235: https://access.redhat.com/articles/1332213

1. Check Point Response to CVE-2015-0235 (glibc – GHOST)

Solution ID: sk104443
Severity: Low

IPS Protection:

Check Point released “GNU C Library gethostbyname Buffer Overflow” IPS protection that protects customer environments.
This protection is part of the Recommended_Protection profile. It enables organizations to add a layer of protection to their network while updating their systems with vendor-provided patches.

OS Level Protection:

  • IPSO OS is not vulnerable.
  • While Check Point Gaia and SecurePlatform operating systems may be susceptible to CVE-2015-0235, there are no known exploits to Check Point software.

Hotfix Packages

Hotfix packages are available for R77.20R77.10R77R76,  and R75.47
R77.20 R77.10 R77 R76 R75.47
Gaia
SecurePlatform

2. Juniper: 2015-01 Out of Cycle Security Bulletin: GHOST glibc gethostbyname() buffer overflow vulnerability (CVE-2015-0235)

Vulnerable Products

  • Junos Space
  • CTPView
  • CTP
  • IDP-SA
  • SRC
  • NSM Appliance
  • JSA and STRM Series

SOLUTION:

  • Junos Space: PR 1060102 has been logged to resolve this issue.
  • IDP-SA: PR 1060071 has been logged to resolve this issue in IDP-OS.
  • CTPView: PR 1060060 has been logged to resolve this issue in CTPView.
  • CTP: PR 1060352 has been logged to resolve this issue in CTP-OS.
  • SRC: PR 1060350 has been logged to resolve this issue.
  • NSM Appliance: PR 1059948 has been logged to resolve this issue.
  • QFabric Director: gethostbyname() functions are used internally, but DNS name resolution is not supplied as a service on external ports.
  • Firefly Host/vGW: The C/C++ based daemon running on the vGW/FFH Security VM agent is not exploitable. Also, the vGW/FFH management system (SD VM) is Java based (Apache Java application server) is not applicable.
  • JSA and STRM: A fix is pending release.
  • IDP Anomaly: The IDP anomaly ​SMTP:OVERFLOW:COMMAND-LINE should cover the known SMTP variant of this vulnerability. For easy attack lookup, the Signatures team has linked CVE-2015-0235 as a reference to this anomaly and also made it part of the recommended policy. All these changes will be reflected in the next signature pack which is scheduled to release on 29-Jan-2015 at 12:00 PST.

WORKAROUND: General Mitigation:

The affected gethostbyname() functions are primarily called in response to references to DNS host names and addresses from the CLI or via services listening on the device.  ​Apply and maintain good security best current practices (BCPs) to limit the exploitable attack surface of critical infrastructure networking equipment.  Use access lists or firewall filters to limit access to networking equipment only from trusted, administrative networks or hosts.  This reduces the risk of remote malicious exploitation of the GHOST vulnerability.

3. Cisco : GNU glibc gethostbyname Function Buffer Overflow Vulnerability

Advisory ID: cisco-sa-20150128-ghost:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

Workarounds:

There are currently no network-based mitigations for this vulnerability or any mitigations that can be performed directly on affected systems.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Skype (Opens in new window)

Like this:

Like Loading...

Related

CVE-2015-0235: GHOST – A Critical Vulnerability in the Glibc Library相关推荐

  1. Visual Studio 2015和2017里面应该创建哪种 Class Library

    微软有些时候是一副不讲道理的大家长作风.一个例子就是它在 Visual Studio 2015/2017 里面配置了一大堆普通人没法理解的 Class Library 模板. 你真的知道应该选哪个吗? ...

  2. cve查询_CVE年满21岁:如何实现这一里程碑

    cve查询 The Common Vulnerabilities and Exposures (CVE) turns 21 this year and, just like any 21-year-o ...

  3. OpenShift 4 - DevSecOps (4) - 实现一个 CICD Pipeline,并用 RHACS 发现安全隐患

    <OpenShift 4.x HOL教程汇总> 本文在 OpenShift 4.10 环境中进行验证. 文章目录 准备环境 安装 RHACS 环境 安装 Gitea,导入 Git Repo ...

  4. OpenShift Security (9) - 用 RHACS 扫描 Log4j 安全漏洞,屏蔽不安全镜像部署

    <OpenShift 4.x HOL教程汇总> 说明:本文已经在 OpenShift 4.9 + RHACS 环境中验证,需要先完成<OpenShift Security (2) - ...

  5. 删除oracle补丁包,最新Oracle关键补丁:更新包括248个修复

    最新的Oracle 关键补丁更新是迄今为止最大的,包含248个修复,共覆盖24个产品线. Oracle关键补丁更新程序已经持续了11年,每年发布四次补丁.安全补丁覆盖24个不同的产品线,包括但不限于O ...

  6. 工控系统的全球安全现状:全球漏洞实例分析

    工控系统的全球安全现状:全球漏洞实例分析 一.摘要 ​ 运营技术(OT).网络和设备,即工业环境中使用的所有组件,在设计时并未考虑到安全性.效率和易用性是最重要的设计特征,然而,由于工业的数字化,越来 ...

  7. 每日安全资讯(2022-12-02)

    author:leadlife time:2022/12/02 paper - Last paper CVE-2020-9273 ProFTPd RCE 漏洞分析与利用 CVE-2022-22972 ...

  8. linux ssh权限漏洞,OpenSSH do_setup_env函数权限提升漏洞(CVE-2015-8325)

    OpenSSH do_setup_env函数权限提升漏洞(CVE-2015-8325) 发布日期:2016-05-02 更新日期:2016-05-04 受影响系统:OpenSSH OpenSSH &l ...

  9. Debian Security Advisory(Debian安全报告) DSA-4410-1 openjdk-8 security update

    Debian Security Advisory(Debian安全报告) DSA-4410-1 openjdk-8 security update Package :openjdk-8 CVE ID: ...

最新文章

  1. Bzoj2780: [Spoj]8093 Sevenk Love Oimaster
  2. 手机主宰了你的生活,这不是乔布斯想看到的
  3. 博世发布7款传感器新品 从汽车到消费电子
  4. 【前端】layui日期控件点击一闪而过解决方法
  5. 树莓派都能做脑机接口了?实时处理8个电极信号,人人用得起 | 开源
  6. 元宇宙iwemeta: 2021年云计算行业发展研究报告
  7. c++字符串大小比较可以用来干什么?
  8. SharePoint At Work----Hyperlinks in the Data View Web Part
  9. Google 在开源上的贡献
  10. 跟新centos的yum源
  11. javaScript第二天(2)
  12. Java 18 新功能介绍
  13. 测试用例,怎么写 ?
  14. 【Computer Organization笔记15】清华计组大作业布置:奋战二十天,做台计算机!
  15. LNMP平台部署及应用
  16. 超好用的云盘资源搜索网站
  17. Chrome插件--IDM
  18. 2020我们一起“只争朝夕,不负韶华”
  19. 我们的地盘,我们做主
  20. 一文带你读懂何为 macOS App 公证,以及如何自动化实现

热门文章

  1. android覆盖扩散动画,[Android]多层波纹扩散动画——自定义View绘制
  2. 10个优秀的 Web UI 库/框架
  3. android theme 使用方法,Android入门之Style与Theme用法实例解析
  4. github怎么自动更新被人更新过的项目_8 个程序员应该掌握的 GitHub 实用技巧
  5. [蓝桥杯][2014年第五届真题]排列序数(思维)
  6. CC2540、nRF51822应用开发比较
  7. nRF51822 SDK初体验
  8. java反射成员变量_java反射之成员变量的反射
  9. 课程设计完成之后要考虑的问题
  10. 【论文阅读】A Gentle Introduction to Graph Neural Networks [图神经网络入门](4)