GHOST - Linux Remote Code Execution CVE-2015-0235 0-day Vulnerability

GHOST - Linux Remote Code Execution CVE-2015-0235 0-day Vulnerability

0
Created On 09/26/18 19:13 PM - Last Modified 07/19/22 23:12 PM


Resolution


On Tuesday, January 27th, a Linux Remote Code Execution Vulnerability was discovered in the GetHost function in certain Linux distributions. This is also known as the "GHOST glib gethostbyname" buffer overflow vulnerability, (CVE-2015-0235).

Palo Alto Networks has confirmed customers are protected against the exploitation of the GHOST buffer overflow vulnerability with IPS Signature ID #30384, "SMTP EHLO/HELO overlong argument anomaly” over SMTP, as is demonstrated in the proof of concept provided by Qualys in their writeup of the vulnerability. A successful attack could lead to remote code execution with the privileges of the server.

Palo Alto Networks customers with a Threat Prevention subscription are advised to verify that they are running the latest content version on their devices and the appropriate action set in their policies. If you have any questions about coverage for this advisory, please contact Support.

For more information on the vulnerability, see:



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm3FCAS&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail