Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2015-0235
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
GNU glibc 基于堆的缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GNU glibc(又名GNU C Library,libc6)是一种按照LGPL许可协议发布的开源免费的C语言编译程序。 GNU glibc 2.2版本和2.18之前2.x版本中的‘__nss_hostname_digits_dots’函数存在基于堆的缓冲区溢出漏洞。本地和远程攻击者都可通过调用‘ gethostbyname*()’函数利用该漏洞以运行应用程序的用户权限执行任意代码,控制系统。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2015-0235
#POC DescriptionSource LinkShenlong Link
1Test wether you're exposed to ghost (CVE-2015-0235). All kudos go to Qualys Securityhttps://github.com/fser/ghost-checkerPOC Details
2A chef cookbook to test the GHOST vulnerabilityhttps://github.com/mikesplain/CVE-2015-0235-cookbookPOC Details
3Ansible playbook to check vulnerability for CVE-2015-0235https://github.com/aaronfay/CVE-2015-0235-testPOC Details
4glibc vulnerability GHOST(CVE-2015-0235) Affected software listhttps://github.com/piyokango/ghostPOC Details
5Nonehttps://github.com/mholzinger/CVE-2015-0235_GHOSTPOC Details
6Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerabilityhttps://github.com/adherzog/ansible-CVE-2015-0235-GHOSTPOC Details
7CVE-2015-0235 patches lenny libc6 packages for amd64https://github.com/favoretti/lenny-libc6POC Details
8gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerabilityhttps://github.com/nickanderson/cfengine-CVE_2015_0235POC Details
9cookbook for update glibc. CVE-2015-0235(GHOST)https://github.com/koudaiii-archives/cookbook-update-glibcPOC Details
10Playbooks 'Fix for CVE-2015-0235(GHOST)' running on Ansiblehttps://github.com/F88/ghostbusters15POC Details
11glibc gethostbyname bughttps://github.com/tobyzxj/CVE-2015-0235POC Details
12A shared library wrapper with additional checks for vulnerable functions gethostbyname2_r gethostbyname_r (GHOST vulnerability)https://github.com/makelinux/CVE-2015-0235-workaroundPOC Details
13CVE-2015-0235 EXIM ESTMP GHOST Glibc Gethostbyname() DoS Exploit/PoChttps://github.com/arm13/ghost_exploitPOC Details
14CVE-2015-0235https://github.com/alanmeyer/CVE-glibcPOC Details
15Script to test vulnarability for CVE-2015-0235https://github.com/1and1-serversupport/ghosttesterPOC Details
16Nonehttps://github.com/sUbc0ol/CVE-2015-0235POC Details
17A check for GHOST; cve-2015-0235https://github.com/chayim/GHOSTCHECK-cve-2015-0235POC Details
18Nonehttps://github.com/limkokholefork/GHOSTCHECK-cve-2015-0235POC Details
19Nonehttps://github.com/furyutei/CVE-2015-0235_GHOSTPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2015-0235
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2015-0235

No comments yet


Leave a comment