Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-0235 PoC — GNU glibc 基于堆的缓冲区错误漏洞

Source
Associated Vulnerability
Title:GNU glibc 基于堆的缓冲区错误漏洞 (CVE-2015-0235)
Description:GNU glibc(又名GNU C Library,libc6)是一种按照LGPL许可协议发布的开源免费的C语言编译程序。 GNU glibc 2.2版本和2.18之前2.x版本中的‘__nss_hostname_digits_dots’函数存在基于堆的缓冲区溢出漏洞。本地和远程攻击者都可通过调用‘ gethostbyname*()’函数利用该漏洞以运行应用程序的用户权限执行任意代码,控制系统。
Description
A check for GHOST; cve-2015-0235
Readme
# Ghostcheck

This is a really, really light fabric script - for checking the impact of CVE-2015-0235 (GHOST) on a running linux host. Forked into Lyrical after writing.

Python 2.6 and higher recommended, and Fabric is needed.

Usage:

fab -f ghostcheck.py -u _sshusername_ -p _sshpassword_ -H _ip_,_ip2_,_ipN_ go

fab -f ghostcheck.py -u _sshusername_ -i _/path/to/ssh/key_ -H _ip_,_ip2_,_ipN_ go
File Snapshot

[4.0K] /data/pocs/4ecbd39f16c3b12c0401e2a633baa6e0fd562c42 ├── [1.8K] ghostcheck.py └── [ 399] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.