|
|
Subscribe / Log in / New account

Re: Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow

From:  Stephane Chazelas <stephane.chazelas-Re5JQEeQqe8AvxtiuMwx3w-AT-public.gmane.org>
To:  oss-security-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8-AT-public.gmane.org
Subject:  Re: Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow
Date:  Wed, 28 Jan 2015 10:42:52 +0000
Message-ID:  <20150128104252.GA5404@chaz.gmail.com>

2015-01-27 11:54:10 -0800, Michal Zalewski:
> > apache, cups, dovecot, gnupg, isc-dhcp, lighttpd, mariadb/mysql,
> > nfs-utils, nginx, nodejs, openldap, openssh, postfix, proftpd,
> > pure-ftpd, rsyslog, samba, sendmail, sysklogd, syslog-ng, tcp_wrappers,
> > vsftpd, xinetd.
> 
> Cool, thanks!
[...]

What about clients? AFAICT from the output of:

sudo stap -e 'probe
  process("/lib/x86_64-linux-gnu/libc.so.6").function("__gethostbyname_r"),
  process("/lib/x86_64-linux-gnu/libc.so.6").function("gethostbyname"),
  process("/lib/x86_64-linux-gnu/libc.so.6").function("gethostbyname2"),
  process("/lib/x86_64-linux-gnu/libc.so.6").function("__gethostbyname2_r"),
  process("/lib/x86_64-linux-gnu/libc.so.6").function("__new_gethostbyname2_r")
  { printf("[%s][%d]->%s(%s)\n", execname(), pid(), pp(), $name$)}'

All of google-chrome, firefox, thunderbird call at least one of
those with network supplied data.

Things like spam filters and antivirus are likely at risk
(thinking of network IDSes and other spam filtering/proxy appliances).

DHCP clients? Fancy wireless auth?

Cheers, 
Stephane





to post comments


Copyright © 2015, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds