It appears we have yet another sleepy crawly creepy bug lurking in the depths of our linux boxes..
A Gblic bug that was not identified as a security bug, perhaps a true y2k bug is effecting us now..
Possible exim.. and more.. in any case a remote execution possibility for many systems...
I guess it time to emergency patch all the server again as soon as the patches come available.
As i read all distros are releasing / building patches for it.
source: http://ift.tt/15JjIXr
Other sources :
http://ift.tt/1JDfLmj
http://ift.tt/1JDfLmn
A Gblic bug that was not identified as a security bug, perhaps a true y2k bug is effecting us now..
Possible exim.. and more.. in any case a remote execution possibility for many systems...
I guess it time to emergency patch all the server again as soon as the patches come available.
As i read all distros are releasing / building patches for it.
source: http://ift.tt/15JjIXr
--[ 1 - Summary ]------------------------------------------------------------- During a code audit performed internally at Qualys, we discovered a buffer overflow in the __nss_hostname_digits_dots() function of the GNU C Library (glibc). This bug is reachable both locally and remotely via the gethostbyname*() functions, so we decided to analyze it -- and its impact -- thoroughly, and named this vulnerability "GHOST". Our main conclusions are: - Via gethostbyname() or gethostbyname2(), the overflowed buffer is located in the heap. Via gethostbyname_r() or gethostbyname2_r(), the overflowed buffer is caller-supplied (and may therefore be located in the heap, stack, .data, .bss, etc; however, we have seen no such call in practice). - At most sizeof(char *) bytes can be overwritten (ie, 4 bytes on 32-bit machines, and 8 bytes on 64-bit machines). Bytes can be overwritten only with digits ('0'...'9'), dots ('.'), and a terminating null character ('\0'). - Despite these limitations, arbitrary code execution can be achieved. As a proof of concept, we developed a full-fledged remote exploit against the Exim mail server, bypassing all existing protections (ASLR, PIE, and NX) on both 32-bit and 64-bit machines. We will publish our exploit as a Metasploit module in the near future. - The first vulnerable version of the GNU C Library is glibc-2.2, released on November 10, 2000. - We identified a number of factors that mitigate the impact of this bug. In particular, we discovered that it was fixed on May 21, 2013 (between the releases of glibc-2.17 and glibc-2.18). Unfortunately, it was not recognized as a security threat; as a result, most stable and long-term-support distributions were left exposed (and still are): Debian 7 (wheezy), Red Hat Enterprise Linux 6 & 7, CentOS 6 & 7, Ubuntu 12.04, for example. Read more... |
Other sources :
http://ift.tt/1JDfLmj
http://ift.tt/1JDfLmn
GHOST glibc Linux Remote Code Execution Vulnerability / gethostbyname CVE-2015-0235
Aucun commentaire:
Enregistrer un commentaire