Glibc Buffer Overflow "GHOST" vulnerability
RISK: High Risk
TYPE: Operating Systems - Linux
A vulnerability was identified in Glibc. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.
A remote or local user can send specially crafted data to trigger a buffer overflow in __nss_hostname_digits_dots() and execute arbitrary code on the target system. The code will run with the privileges of the target application or service using the glibc library.
The buffer overflow can be accessed via the various gethostbyname() functions.
Impact
- Elevation of Privilege
- Remote Code Execution
System / Technologies affected
- glibc versions 2.2 - 2.17
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 2.18 or later
Vulnerability Identifier
Related Link
Share with