Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:PHP:GHOST-GLIBC-WP

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Wordpress CVE-2015-0235 glibc Hostname RCE

Release Date

2015/02/02

Update Number

2463

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Wordpress CVE-2015-0235 glibc Hostname RCE


This signature detects an attempt to exploit a known vulnerability in WordPress while passing the hostname value as an argument to "GetHOSTbyname" function which is being implemented in glibc library. Successful exploitation could allow an attacker to craft a malicious arbitrary string and could lead to further attacks.

Extended Description

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

Affected Products

  • Gnu glibc 2.0
  • Gnu glibc 2.0.1
  • Gnu glibc 2.0.2
  • Gnu glibc 2.0.3
  • Gnu glibc 2.0.4
  • Gnu glibc 2.0.5
  • Gnu glibc 2.0.6
  • Gnu glibc 2.1
  • Gnu glibc 2.10.1
  • Gnu glibc 2.11
  • Gnu glibc 2.1.1
  • Gnu glibc 2.11.1
  • Gnu glibc 2.11.2
  • Gnu glibc 2.11.3
  • Gnu glibc 2.1.1.6
  • Gnu glibc 2.12
  • Gnu glibc 2.1.2
  • Gnu glibc 2.12.1
  • Gnu glibc 2.12.2
  • Gnu glibc 2.13
  • Gnu glibc 2.1.3
  • Gnu glibc 2.14
  • Gnu glibc 2.14.1
  • Gnu glibc 2.15
  • Gnu glibc 2.16
  • Gnu glibc 2.17
  • Gnu glibc 2.1.9
  • Gnu glibc 2.2
  • Gnu glibc 2.2.1
  • Gnu glibc 2.2.2
  • Gnu glibc 2.2.3
  • Gnu glibc 2.2.4
  • Gnu glibc 2.2.5
  • Oracle communications_applications 13.1
  • Oracle oracle_pillar_axiom 6.1
  • Oracle oracle_pillar_axiom 6.2
  • Oracle oracle_pillar_axiom 6.3

References

  • CVE: CVE-2015-0235
  • URL: https://access.redhat.com/articles/1332213
  • URL: https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out