CVE-2015-0235
Summary
| CVE | CVE-2015-0235 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-01-28 19:59:00 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST." |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Apple | Mac Os X | All | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Application | Gnu | Glibc | All | All | All | All |
| Application | Ibm | Pureapplication System | 1.0.0.0 | All | All | All |
| Application | Ibm | Pureapplication System | 1.1.0.0 | All | All | All |
| Application | Ibm | Pureapplication System | 2.0.0.0 | All | All | All |
| Application | Ibm | Security Access Manager For Enterprise Single Sign-on | 8.2 | All | All | All |
| Application | Oracle | Communications Application Session Controller | All | All | All | All |
| Application | Oracle | Communications Eagle Application Processor | 16.0 | All | All | All |
| Application | Oracle | Communications Eagle Lnp Application Processor | 10.0 | All | All | All |
| Application | Oracle | Communications Lsms | 13.1 | All | All | All |
| Application | Oracle | Communications Policy Management | 10.4.1 | All | All | All |
| Application | Oracle | Communications Policy Management | 11.5 | All | All | All |
| Application | Oracle | Communications Policy Management | 12.1.1 | All | All | All |
| Application | Oracle | Communications Policy Management | 9.7.3 | All | All | All |
| Application | Oracle | Communications Policy Management | 9.9.1 | All | All | All |
| Application | Oracle | Communications Session Border Controller | All | All | All | All |
| Application | Oracle | Communications Session Border Controller | 7.2.0 | - | All | All |
| Application | Oracle | Communications Session Border Controller | 8.0.0 | All | All | All |
| Application | Oracle | Communications User Data Repository | All | All | All | All |
| Application | Oracle | Communications Webrtc Session Controller | 7.0 | All | All | All |
| Application | Oracle | Communications Webrtc Session Controller | 7.1 | All | All | All |
| Application | Oracle | Communications Webrtc Session Controller | 7.2 | All | All | All |
| Application | Oracle | Exalogic Infrastructure | 1.0 | All | All | All |
| Application | Oracle | Exalogic Infrastructure | 2.0 | All | All | All |
| Operating System | Oracle | Linux | 5 | - | All | All |
| Operating System | Oracle | Linux | 7 | 0 | All | All |
| Application | Oracle | Vm Virtualbox | All | All | All | All |
| Application | Php | Php | All | All | All | All |
| Application | Redhat | Virtualization | 6.0 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Advisory SA62681 - SUSE update for glibc - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Security Advisory SA62715 - IBM Security Access Manager for Enterprise Single Sign-On GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Access Manager for Web (CVE-2015-0235) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| CPU Oct 2018 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| GNU glibc gethostbyname Function Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | tools.cisco.com | Third Party Advisory |
| www.securityfocus.com/bid/72325 | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| StruxureWare Data Center Operation Software Vulnerability Fixes - User Assistance for StruxureWare Data Center Operation 8 - Help Center: Support for EcoStruxure IT, StruxureWare for Data Centers, and NetBotz | af854a3a-2127-422b-91ae-364da2661108 | help.ecostruxureit.com | Third Party Advisory |
| '[security bulletin] HPSBMU03330 rev.1 - HP Matrix Operating Environment (MOE) running glibc on Linux' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | Issue Tracking, Mailing List, Third Party Advisory |
| IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM PureApplication System (CVE-2015-0235) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Exploit, Third Party Advisory, VDB Entry |
| '[security bulletin] HPSBHF03289 rev.1- HP ThinClient PCs running ThinPro Linux, Remote Code Executio' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | Issue Tracking, Mailing List, Third Party Advisory |
| Full Disclosure: SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Exploit, Mailing List, Third Party Advisory |
| Full Disclosure: Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| EMC Secure Remote Services GHOST / SQL Injection / Command Injection ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | Third Party Advisory, VDB Entry |
| Security Advisory SA62698 - Oracle Linux update for glibc - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| oss-security - 21Nails: Multiple vulnerabilities in Exim | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Exploit, Mailing List |
| Security Advisory SA62870 - IBM Workload Deployer GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| The glibc (Ghost) vulnerability: affected versions, recommended steps and workarounds | af854a3a-2127-422b-91ae-364da2661108 | www.sophos.com | Third Party Advisory |
| About the security content of OS X El Capitan 10.11.1, Security Update 2015-004 Yosemite, and Security Update 2015-007 Mavericks - Apple Support | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Third Party Advisory |
| The Laws of Vulnerabilities: The GHOST Vulnerab... | Qualys Community | af854a3a-2127-422b-91ae-364da2661108 | community.qualys.com | Third Party Advisory |
| Juniper Networks - 2015-01 Out of Cycle Security Bulletin: GHOST glibc gethostbyname() buffer overflow vulnerability (CVE-2015-0235) - Knowledge Base | af854a3a-2127-422b-91ae-364da2661108 | kb.juniper.net | Third Party Advisory |
| Security Advisory SA62517 - McAfee Multiple Products GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| linux.oracle.com | ELSA-2015-0092 - glibc security update | af854a3a-2127-422b-91ae-364da2661108 | linux.oracle.com | Third Party Advisory |
| Oracle Critical Patch Update - October 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt | af854a3a-2127-422b-91ae-364da2661108 | www.qualys.com | Third Party Advisory |
| APPLE-SA-2015-09-30-3 OS X El Capitan 10.11 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | Mailing List, Third Party Advisory |
| Oracle Critical Patch Update - July 2015 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Third Party Advisory |
| Full Disclosure: SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Exploit, Mailing List, Third Party Advisory |
| '[security bulletin] HPSBGN03270 rev.1 - HP Operations Analytics, Remote Execution of Code' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | Issue Tracking, Mailing List, Third Party Advisory |
| McAfee KnowledgeBase - McAfee Security Bulletin - GHOST Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | Third Party Advisory |
| Exim ESMTP GHOST Denial Of Service ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| HPE Support document - HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20564.www2.hpe.com | Third Party Advisory |
| '[security bulletin] HPSBGN03247 rev.1 - HP IceWall SSO Dfw using glibc, Remote Execution of Abitrary' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | Issue Tracking, Mailing List, Third Party Advisory |
| Home | Blue Coat Systems, Inc. | af854a3a-2127-422b-91ae-364da2661108 | bto.bluecoat.com | Third Party Advisory |
| cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf | af854a3a-2127-422b-91ae-364da2661108 | cert-portal.siemens.com | Third Party Advisory |
| Oracle Critical Patch Update - October 2015 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Arista - Security Advisory 0009 | af854a3a-2127-422b-91ae-364da2661108 | www.arista.com | Third Party Advisory |
| Security Advisory SA62865 - IBM WebSphere Transformation Extender GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Security Advisory SA62813 - IBM Security Network Protection Multiple Vulnerabilities - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| oss-sec: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| Security Advisory SA62690 - Juniper Multiple Products GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| oss-sec: Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Exploit, Mailing List, Third Party Advisory |
| APPLE-SA-2015-06-30-2 OS X Yosemite v10.10.4 and Security Update 2015-005 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | Mailing List, Third Party Advisory |
| Oracle Critical Patch Update - July 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| Nexans FTTO GigaSwitch Outdated Components / Hardcoded Backdoor ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Network Protection (CVE-2015-0235) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| 404 Not Found | af854a3a-2127-422b-91ae-364da2661108 | www.idirect.net | Broken Link, URL Repurposed |
| IBM Security Bulletin: GNU C library (glibc) vulnerability affects QRadar SIEM, QRadar Risk Manager, and QRadar Vulnerability Manager (CVE-2015-0235) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Proventia Network Enterprise Scanner (CVE-2015-0235) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| Oracle Critical Patch Update - April 2015 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Virtual Server Protection for VMware (CVE-2015-0235) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| Security Advisory SA62692 - Cisco Multiple Products GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Security Advisory SA62680 - Ubuntu update for eglibc - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Gentoo Security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| IBM Security Bulletin: GNU C library (glibc) vulnerability affects WebSphere Transformation Extender with Launcher Hypervisor Edition [for RHEL] (CVE-2015-0235) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| Oracle Critical Patch Update - October 2017 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| Full Disclosure: SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Exploit, Mailing List, Third Party Advisory |
| Oracle Critical Patch Update - January 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Security Advisory SA62871 - IBM PureApplication System GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Security Advisory SA62667 - Red Hat update for glibc - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Access Manager for Mobile (CVE-2015-0235) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Workload Deployer (CVE-2015-0235) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| Exim GHOST (glibc gethostbyname) Buffer Overflow ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| Oracle Communications Applications Flaws Let Remote Users Gain Elevated Privileges and Partially Access Data, Modify Data, and Deny Service - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Bugtraq: SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Exploit, Mailing List, Third Party Advisory |
| linux.oracle.com | ELSA-2015-0090 - glibc security update | af854a3a-2127-422b-91ae-364da2661108 | linux.oracle.com | Third Party Advisory |
| Support / Security / Advisories / / MDVSA-2015:039 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | Third Party Advisory |
| Security Advisory SA62758 - IBM Security Access Manager for Mobile GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Security Advisory SA62688 - Sophos Multiple Products GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Security Advisory SA62883 - IBM Proventia Network Enterprise Scanner GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| fsc-2015-1 | F-Secure Labs | af854a3a-2127-422b-91ae-364da2661108 | www.f-secure.com | Third Party Advisory |
| Debian -- Security Information -- DSA-3142-1 eglibc | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| Security Advisory SA62816 - F-Secure Messaging Security Gateway GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| '[security bulletin] HPSBGN03285 rev.1 - HP Business Service Manager Virtual Appliance, Multiple Vul' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | Issue Tracking, Mailing List, Third Party Advisory |
| Oracle Critical Patch Update - July 2017 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| IBM Security Bulletin: Security Bulletin: GNU C library (glibc) vulnerability is fixed in IBM Security Access Manager for Enterprise Single Sign-On Virtual Appliance (CVE-2015-0235) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| About the security content of OS X El Capitan v10.11 - Apple Support | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Third Party Advisory |
| About the security content of OS X Yosemite v10.10.4 and Security Update 2015-005 - Apple Support | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Third Party Advisory |
| Security Advisory SA62691 - Blue Coat Multiple Products GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| CVE-2015-0235 GNU C Library (glibc) Vulnerability in Multiple NetApp Products | NetApp Product Security | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | Third Party Advisory |
| Oracle July 2016 Critical Patch Update Multiple Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Security Advisory SA62640 - IBM Security QRadar SIEM Multiple Vulnerabilities - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| WAGO 852 Industrial Managed Switch Series Code Execution / Hardcoded Credentials ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| Moxa Command Injection / Cross Site Scripting / Vulnerable Software ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| Security Advisory SA62879 - IBM Security Virtual Server Protection for VMware GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Sophos products and the GHOST vulnerability affecting Linux | Sophos Blog | af854a3a-2127-422b-91ae-364da2661108 | blogs.sophos.com | Third Party Advisory |
| Security Advisory SA62812 - IBM Security Access Manager for Web GNU C Library Buffer Overflow Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Vulnerabilities resolved in TRITON APX Version 8.0 | af854a3a-2127-422b-91ae-364da2661108 | www.websense.com | Broken Link, Permissions Required |
| APPLE-SA-2015-10-21-4 OS X El Capitan 10.11.1 and Security Update 2015-007 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 591368 Eaton Power Xpert Gateway models buffer overflow Vulnerability (ETN-SB-2015-1002)