Short Name |
HTTP:PHP:GHOST-GLIBC-WP |
---|---|
Severity |
Major |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Wordpress CVE-2015-0235 glibc Hostname RCE |
Release Date |
2015/02/02 |
Update Number |
2463 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects an attempt to exploit a known vulnerability in WordPress while passing the hostname value as an argument to "GetHOSTbyname" function which is being implemented in glibc library. Successful exploitation could allow an attacker to craft a malicious arbitrary string and could lead to further attacks.
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."