<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: GHOST security bug in Linux</title>
	<atom:link href="http://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 09 Apr 2026 15:47:07 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/comment-page-1/#comment-1355450</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Mar 2015 07:56:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29923#comment-1355450</guid>
		<description><![CDATA[PHP Applications, WordPress Subject to Ghost glibc Vulnerability - See more at: https://threatpost.com/php-applications-wordpress-subject-to-ghost-glibc-vulnerability/110755#sthash.9Z1N6Bjz.dpuf]]></description>
		<content:encoded><![CDATA[<p>PHP Applications, WordPress Subject to Ghost glibc Vulnerability &#8211; See more at: <a href="https://threatpost.com/php-applications-wordpress-subject-to-ghost-glibc-vulnerability/110755#sthash.9Z1N6Bjz.dpuf" rel="nofollow">https://threatpost.com/php-applications-wordpress-subject-to-ghost-glibc-vulnerability/110755#sthash.9Z1N6Bjz.dpuf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/comment-page-1/#comment-1355449</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Mar 2015 07:56:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29923#comment-1355449</guid>
		<description><![CDATA[GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems - See more at: https://threatpost.com/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems/110679#sthash.bwz4f7S2.dpuf]]></description>
		<content:encoded><![CDATA[<p>GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems &#8211; See more at: <a href="https://threatpost.com/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems/110679#sthash.bwz4f7S2.dpuf" rel="nofollow">https://threatpost.com/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems/110679#sthash.bwz4f7S2.dpuf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/comment-page-1/#comment-1347623</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 12:40:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29923#comment-1347623</guid>
		<description><![CDATA[What the GHOST tells us about free software vulnerability management
https://blog.hboeck.de/archives/864-What-the-GHOST-tells-us-about-free-software-vulnerability-management.html

GHOST itself is a Heap Overflow in the name resolution function of the Glibc.

Technically GHOST is a heap overflow, which is a very common bug in C programming. C is inherently prone to these kinds of memory corruption errors and there are essentially two things here to move forwards: Improve the use of exploit mitigation techniques like ASLR and create new ones (levee is an interesting project, watch this 31C3 talk). And if possible move away from C altogether and develop core components in memory safe languages (I have high hopes for the Mozilla Servo project, watch this linux.conf.au talk).

GHOST was discovered three times

But the thing I want to elaborate here is something different about GHOST: It turns out that it has been discovered independently three times. It was already fixed in 2013 in the Glibc Code itself. The commit message didn&#039;t indicate that it was a security vulnerability. Then in early 2014 developers at Google found it again using Address Sanitizer (which – by the way – tells you that all software developers should use Address Sanitizer more often to test their software). Google fixed it in Chrome OS and explicitly called it an overflow and a vulnerability. And then recently Qualys found it again and made it public.

Now you may wonder why a vulnerability fixed in 2013 made headlines in 2015. The reason is that it widely wasn&#039;t fixed because it wasn&#039;t publicly known that it was serious. I don&#039;t think there was any malicious intent. The original Glibc fix was probably done without anyone noticing that it is serious and the Google devs may have thought that the fix is already public, so they don&#039;t need to make any noise about it. But we can clearly see that something doesn&#039;t work here. Which brings us to a discussion how the Linux and free software world in general and vulnerability management in particular work.

The “Never touch a running system” principle

Quite early when I came in contact with computers I heard the phrase “Never touch a running system”. This may have been a reasonable approach to IT systems back then when computers usually weren&#039;t connected to any networks and when remote exploits weren&#039;t a thing, but it certainly isn&#039;t a good idea today in a world where almost every computer is part of the Internet. Because once new security vulnerabilities become public you should change your system and fix them. However that doesn&#039;t change the fact that many people still operate like that.

A number of Linux distributions provide “stable” or “Long Time Support” versions. 

These systems are delivered with an implicit promise: We will take care of security and if you update regularly you&#039;ll have a system that doesn&#039;t change much, but that will be secure against know threats. Now the interesting question is: How well do these systems deliver on that promise and how hard is that?

Vulnerability management is chaotic and fragile

LTS and stable distributions are there for a reason

The big question is of course what to do about it. OpenBSD developer Ted Unangst wrote a blog post yesterday titled Long term support considered harmful, I suggest you read it. He argues that we should get rid of long term support completely and urge users to upgrade more often. OpenBSD has a 6 month release cycle and supports two releases, so one version gets supported for one year.

Given what I wrote before you may think that I agree with him, but I don&#039;t. While I personally always avoided to use too old systems – I &#039;m usually using Gentoo which doesn&#039;t have any snapshot releases at all and does rolling releases – I can see the value in long term support releases. There are a lot of systems out there – connected to the Internet – that are never updated. Taking away the option to install systems and let them run with relatively little maintenance overhead over several years will probably result in more systems never receiving any security updates. With all its imperfectness running a Debian Squeeze with the latest updates is certainly better than running an operating system from 2011 that stopped getting security fixes in 2012.


Improving the information flow

I don&#039;t think there is a silver bullet solution, but I think there are things we can do to improve the situation. What could be done is to coordinate and share the work. Debian, Red Hat and other distributions with stable/LTS versions could agree that their next versions are based on a specific Glibc version and they collaboratively work on providing patch sets to fix all the vulnerabilities in it. This already somehow happens with upstream projects providing long term support versions, the Linux kernel does that for example. Doing that at scale would require vast organizational changes in the Linux distributions. They would have to agree on a roughly common timescale to start their stable versions.]]></description>
		<content:encoded><![CDATA[<p>What the GHOST tells us about free software vulnerability management<br />
<a href="https://blog.hboeck.de/archives/864-What-the-GHOST-tells-us-about-free-software-vulnerability-management.html" rel="nofollow">https://blog.hboeck.de/archives/864-What-the-GHOST-tells-us-about-free-software-vulnerability-management.html</a></p>
<p>GHOST itself is a Heap Overflow in the name resolution function of the Glibc.</p>
<p>Technically GHOST is a heap overflow, which is a very common bug in C programming. C is inherently prone to these kinds of memory corruption errors and there are essentially two things here to move forwards: Improve the use of exploit mitigation techniques like ASLR and create new ones (levee is an interesting project, watch this 31C3 talk). And if possible move away from C altogether and develop core components in memory safe languages (I have high hopes for the Mozilla Servo project, watch this linux.conf.au talk).</p>
<p>GHOST was discovered three times</p>
<p>But the thing I want to elaborate here is something different about GHOST: It turns out that it has been discovered independently three times. It was already fixed in 2013 in the Glibc Code itself. The commit message didn&#8217;t indicate that it was a security vulnerability. Then in early 2014 developers at Google found it again using Address Sanitizer (which – by the way – tells you that all software developers should use Address Sanitizer more often to test their software). Google fixed it in Chrome OS and explicitly called it an overflow and a vulnerability. And then recently Qualys found it again and made it public.</p>
<p>Now you may wonder why a vulnerability fixed in 2013 made headlines in 2015. The reason is that it widely wasn&#8217;t fixed because it wasn&#8217;t publicly known that it was serious. I don&#8217;t think there was any malicious intent. The original Glibc fix was probably done without anyone noticing that it is serious and the Google devs may have thought that the fix is already public, so they don&#8217;t need to make any noise about it. But we can clearly see that something doesn&#8217;t work here. Which brings us to a discussion how the Linux and free software world in general and vulnerability management in particular work.</p>
<p>The “Never touch a running system” principle</p>
<p>Quite early when I came in contact with computers I heard the phrase “Never touch a running system”. This may have been a reasonable approach to IT systems back then when computers usually weren&#8217;t connected to any networks and when remote exploits weren&#8217;t a thing, but it certainly isn&#8217;t a good idea today in a world where almost every computer is part of the Internet. Because once new security vulnerabilities become public you should change your system and fix them. However that doesn&#8217;t change the fact that many people still operate like that.</p>
<p>A number of Linux distributions provide “stable” or “Long Time Support” versions. </p>
<p>These systems are delivered with an implicit promise: We will take care of security and if you update regularly you&#8217;ll have a system that doesn&#8217;t change much, but that will be secure against know threats. Now the interesting question is: How well do these systems deliver on that promise and how hard is that?</p>
<p>Vulnerability management is chaotic and fragile</p>
<p>LTS and stable distributions are there for a reason</p>
<p>The big question is of course what to do about it. OpenBSD developer Ted Unangst wrote a blog post yesterday titled Long term support considered harmful, I suggest you read it. He argues that we should get rid of long term support completely and urge users to upgrade more often. OpenBSD has a 6 month release cycle and supports two releases, so one version gets supported for one year.</p>
<p>Given what I wrote before you may think that I agree with him, but I don&#8217;t. While I personally always avoided to use too old systems – I &#8216;m usually using Gentoo which doesn&#8217;t have any snapshot releases at all and does rolling releases – I can see the value in long term support releases. There are a lot of systems out there – connected to the Internet – that are never updated. Taking away the option to install systems and let them run with relatively little maintenance overhead over several years will probably result in more systems never receiving any security updates. With all its imperfectness running a Debian Squeeze with the latest updates is certainly better than running an operating system from 2011 that stopped getting security fixes in 2012.</p>
<p>Improving the information flow</p>
<p>I don&#8217;t think there is a silver bullet solution, but I think there are things we can do to improve the situation. What could be done is to coordinate and share the work. Debian, Red Hat and other distributions with stable/LTS versions could agree that their next versions are based on a specific Glibc version and they collaboratively work on providing patch sets to fix all the vulnerabilities in it. This already somehow happens with upstream projects providing long term support versions, the Linux kernel does that for example. Doing that at scale would require vast organizational changes in the Linux distributions. They would have to agree on a roughly common timescale to start their stable versions.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/comment-page-1/#comment-1341353</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 12 Feb 2015 08:50:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29923#comment-1341353</guid>
		<description><![CDATA[Cisco says GHOST is more Casper than Sleepy Hollow
Borg exorcised GHOST years ago when it sent IPv4 to the nether realms
http://www.theregister.co.uk/2015/01/29/cisco_ghost_is_more_casper_than_sleepy_hollow/

Cisco has put forward at least a partial response to 2015&#039;s first branded bug, GHOST, saying that in The Borg&#039;s world, the glibc vulnerability is probably of relatively low severity.

That would, at least, explain why it&#039;s not being hunted with quite the urgency of something like Heartbleed in 2014: right now, Cisco&#039;s advisory states that it hasn&#039;t confirmed the vulnerability status of any individual products.

“The superseding function is getaddrinfo() which … is not affected by this buffer overflow”.

Cisco says its intrusion prevention system and next generation firewall both include rules that would block attempts to exploit GHOST, and the company will issue an advisory if any of its products turn out to be vulnerable and need patching.]]></description>
		<content:encoded><![CDATA[<p>Cisco says GHOST is more Casper than Sleepy Hollow<br />
Borg exorcised GHOST years ago when it sent IPv4 to the nether realms<br />
<a href="http://www.theregister.co.uk/2015/01/29/cisco_ghost_is_more_casper_than_sleepy_hollow/" rel="nofollow">http://www.theregister.co.uk/2015/01/29/cisco_ghost_is_more_casper_than_sleepy_hollow/</a></p>
<p>Cisco has put forward at least a partial response to 2015&#8242;s first branded bug, GHOST, saying that in The Borg&#8217;s world, the glibc vulnerability is probably of relatively low severity.</p>
<p>That would, at least, explain why it&#8217;s not being hunted with quite the urgency of something like Heartbleed in 2014: right now, Cisco&#8217;s advisory states that it hasn&#8217;t confirmed the vulnerability status of any individual products.</p>
<p>“The superseding function is getaddrinfo() which … is not affected by this buffer overflow”.</p>
<p>Cisco says its intrusion prevention system and next generation firewall both include rules that would block attempts to exploit GHOST, and the company will issue an advisory if any of its products turn out to be vulnerable and need patching.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/comment-page-1/#comment-1336997</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Feb 2015 13:23:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29923#comment-1336997</guid>
		<description><![CDATA[Critical &#039;Ghost&#039; Linux flaw can be exploited through WordPress, other PHP apps
http://www.pcworld.com/article/2878252/ghost-linux-vulnerability-can-be-exploited-through-wordpress-other-php-apps.html

However, researchers from website security research firm Sucuri said Wednesday that they have good reasons to believe the flaw can also be exploited through Web applications written in PHP that use gethostbyname() function wrappers. This has the potentially to significantly expand the attack vectors.

One clear example of such a PHP application is WordPress, which uses a function called wp_http_validate_url() to validate the URLs of pingback posts.

“It does so by using gethostbyname(), so an attacker could leverage this vector to insert a malicious URL that would trigger a buffer overflow bug, server-side, potentially allowing him to gain privileges on the server,” Sucuri senior vulnerability researcher Marc-Alexandre Montpas said in a blog post.

Then Thursday, security researchers from Trustwave SpiderLabs created a proof-of-concept script to trigger the glibc buffer overflow though the WordPress pingback feature.

“This PoC allows users to remotely verify if a target web server is vulnerable to the CVE however it does not demonstrate exploitability,” they said in a blog post.

GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)
http://blog.spiderlabs.com/2015/01/ghost-gethostbyname-heap-overflow-in-glibc-cve-2015-0235.html

Recommendations
Install glibc Patches
And don&#039;t forget to reboot! 
Disable XML-RPC

It is possible to disable the XML-RPC process altogether if you do not want to use it.  There are even plugins that will disable it.

Disable Pingback Requests
You may also disable the pingback feature by adding the following to your functions.php file

WAF Protections
By using a WAF, you can identify initial pingback XML requests on your Wordpress site and look for attacks. 

Monitor Your Logs
When attackers are attempting to exploit this vulnerability against your web servers, there will most likely be error messages (segmentation faults, etc...) that will indicate a problem.  Organizations should be vigilant in monitoring their logs and following up on an anomalous errors.]]></description>
		<content:encoded><![CDATA[<p>Critical &#8216;Ghost&#8217; Linux flaw can be exploited through WordPress, other PHP apps<br />
<a href="http://www.pcworld.com/article/2878252/ghost-linux-vulnerability-can-be-exploited-through-wordpress-other-php-apps.html" rel="nofollow">http://www.pcworld.com/article/2878252/ghost-linux-vulnerability-can-be-exploited-through-wordpress-other-php-apps.html</a></p>
<p>However, researchers from website security research firm Sucuri said Wednesday that they have good reasons to believe the flaw can also be exploited through Web applications written in PHP that use gethostbyname() function wrappers. This has the potentially to significantly expand the attack vectors.</p>
<p>One clear example of such a PHP application is WordPress, which uses a function called wp_http_validate_url() to validate the URLs of pingback posts.</p>
<p>“It does so by using gethostbyname(), so an attacker could leverage this vector to insert a malicious URL that would trigger a buffer overflow bug, server-side, potentially allowing him to gain privileges on the server,” Sucuri senior vulnerability researcher Marc-Alexandre Montpas said in a blog post.</p>
<p>Then Thursday, security researchers from Trustwave SpiderLabs created a proof-of-concept script to trigger the glibc buffer overflow though the WordPress pingback feature.</p>
<p>“This PoC allows users to remotely verify if a target web server is vulnerable to the CVE however it does not demonstrate exploitability,” they said in a blog post.</p>
<p>GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)<br />
<a href="http://blog.spiderlabs.com/2015/01/ghost-gethostbyname-heap-overflow-in-glibc-cve-2015-0235.html" rel="nofollow">http://blog.spiderlabs.com/2015/01/ghost-gethostbyname-heap-overflow-in-glibc-cve-2015-0235.html</a></p>
<p>Recommendations<br />
Install glibc Patches<br />
And don&#8217;t forget to reboot!<br />
Disable XML-RPC</p>
<p>It is possible to disable the XML-RPC process altogether if you do not want to use it.  There are even plugins that will disable it.</p>
<p>Disable Pingback Requests<br />
You may also disable the pingback feature by adding the following to your functions.php file</p>
<p>WAF Protections<br />
By using a WAF, you can identify initial pingback XML requests on your WordPress site and look for attacks. </p>
<p>Monitor Your Logs<br />
When attackers are attempting to exploit this vulnerability against your web servers, there will most likely be error messages (segmentation faults, etc&#8230;) that will indicate a problem.  Organizations should be vigilant in monitoring their logs and following up on an anomalous errors.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/comment-page-1/#comment-1336993</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Feb 2015 13:14:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29923#comment-1336993</guid>
		<description><![CDATA[Critical “GHOST” Vulnerability Released
http://blog.sucuri.net/2015/01/critical-ghost-vulnerability-released.html

Update as soon as possible!

This is a very critical vulnerability and should be treated as such. If you have a dedicated server (or VPS) running Linux, you have to make sure you update it right away. We know for a fact that Centos/RHEL/Fedora 5,6,7 as vulnerable, as well as some Ubuntu versions.]]></description>
		<content:encoded><![CDATA[<p>Critical “GHOST” Vulnerability Released<br />
<a href="http://blog.sucuri.net/2015/01/critical-ghost-vulnerability-released.html" rel="nofollow">http://blog.sucuri.net/2015/01/critical-ghost-vulnerability-released.html</a></p>
<p>Update as soon as possible!</p>
<p>This is a very critical vulnerability and should be treated as such. If you have a dedicated server (or VPS) running Linux, you have to make sure you update it right away. We know for a fact that Centos/RHEL/Fedora 5,6,7 as vulnerable, as well as some Ubuntu versions.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/comment-page-1/#comment-1336942</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Feb 2015 11:03:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29923#comment-1336942</guid>
		<description><![CDATA[Proof-of-concept WordPress Ghost attack appears
http://www.v3.co.uk/v3-uk/news/2392369/ghost-linux-bug-haunting-red-hat-and-ubuntu-systems

Hackers could exploit the Ghost Linux bug using WordPress-based attacks, according to researchers at Trustwave, which has produced a proof-of-concept cyber attack to prove its claim.

Ziv Mador, vice president of security research at Trustwave, told V3 that the proof-of-concept will work on all vulnerable Linux systems, and showcases how hackers could exploit Ghost.

&quot;The proof-of-concept code can be used to check whether a remote web server is vulnerable to Ghost. It works by sending an XML request to the XML-RPC Pingback functionality of WordPress which includes a long URL,&quot; he explained.

&quot;The code works on patched and unpatched versions but they will respond in a different way thus allowing the researcher or administrator to determine whether the server is patched or not.&quot;

t is currently unclear whether Ghost is being actively exploited, although Qualys believes that hackers could bypass many traditional defences.

&quot;During our testing, we developed a proof-of-concept in which we send a specially created email to a mail server and can get a remote shell to the Linux machine,&quot; read the advisory.

&quot;This bypasses all existing protections (like ASLR, PIE and NX) on both 32-bit and 64-bit systems.&quot;]]></description>
		<content:encoded><![CDATA[<p>Proof-of-concept WordPress Ghost attack appears<br />
<a href="http://www.v3.co.uk/v3-uk/news/2392369/ghost-linux-bug-haunting-red-hat-and-ubuntu-systems" rel="nofollow">http://www.v3.co.uk/v3-uk/news/2392369/ghost-linux-bug-haunting-red-hat-and-ubuntu-systems</a></p>
<p>Hackers could exploit the Ghost Linux bug using WordPress-based attacks, according to researchers at Trustwave, which has produced a proof-of-concept cyber attack to prove its claim.</p>
<p>Ziv Mador, vice president of security research at Trustwave, told V3 that the proof-of-concept will work on all vulnerable Linux systems, and showcases how hackers could exploit Ghost.</p>
<p>&#8220;The proof-of-concept code can be used to check whether a remote web server is vulnerable to Ghost. It works by sending an XML request to the XML-RPC Pingback functionality of WordPress which includes a long URL,&#8221; he explained.</p>
<p>&#8220;The code works on patched and unpatched versions but they will respond in a different way thus allowing the researcher or administrator to determine whether the server is patched or not.&#8221;</p>
<p>t is currently unclear whether Ghost is being actively exploited, although Qualys believes that hackers could bypass many traditional defences.</p>
<p>&#8220;During our testing, we developed a proof-of-concept in which we send a specially created email to a mail server and can get a remote shell to the Linux machine,&#8221; read the advisory.</p>
<p>&#8220;This bypasses all existing protections (like ASLR, PIE and NX) on both 32-bit and 64-bit systems.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/comment-page-1/#comment-1335405</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Jan 2015 09:54:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29923#comment-1335405</guid>
		<description><![CDATA[GHOST: which services are vulnerable, ssh, web server?
http://security.stackexchange.com/questions/80217/ghost-which-services-are-vulnerable-ssh-web-server


I don&#039;t buy the OpenSSH &quot;mitigation&quot; linked to - Reverse DNS in OpenSSH or OpenSSH+libwrap is not exploitable.)
Because of common programming idioms, and the very specific code paths to the vulnerable code, many programs are not vulnerable. To be clear, there is a problem affecting a handful of DNS related functions in glibc(&lt;2.18), and DNS is an excellent way to get attacker controlled data into a system, though it&#039;s not a great way to get arbitrary data in. But, unlike some recent high profile issues, simply using the library or using those functions does not automatically make a program vulnerable.
glibc has had that function since 1996 (pre v2.0), so gethostbyname() won&#039;t be called by OpenSSH.
In the general case, since conforming DNS data cannot contain problematic long/malformed IP addresses, reverse look up and forward/reverse checks are not an attack vector. Where hostnames/dotted-quad addresses are part of a higher protocol (e.g. the SMTP EHLO name, as used exploiting Exim) then you might have something. For OpenSSH this would suggest host names in port-forwarding. Close, but no cigar, even if OpenSSH did use gethostbyname() directly]]></description>
		<content:encoded><![CDATA[<p>GHOST: which services are vulnerable, ssh, web server?<br />
<a href="http://security.stackexchange.com/questions/80217/ghost-which-services-are-vulnerable-ssh-web-server" rel="nofollow">http://security.stackexchange.com/questions/80217/ghost-which-services-are-vulnerable-ssh-web-server</a></p>
<p>I don&#8217;t buy the OpenSSH &#8220;mitigation&#8221; linked to &#8211; Reverse DNS in OpenSSH or OpenSSH+libwrap is not exploitable.)<br />
Because of common programming idioms, and the very specific code paths to the vulnerable code, many programs are not vulnerable. To be clear, there is a problem affecting a handful of DNS related functions in glibc(&lt;2.18), and DNS is an excellent way to get attacker controlled data into a system, though it&#039;s not a great way to get arbitrary data in. But, unlike some recent high profile issues, simply using the library or using those functions does not automatically make a program vulnerable.<br />
glibc has had that function since 1996 (pre v2.0), so gethostbyname() won&#039;t be called by OpenSSH.<br />
In the general case, since conforming DNS data cannot contain problematic long/malformed IP addresses, reverse look up and forward/reverse checks are not an attack vector. Where hostnames/dotted-quad addresses are part of a higher protocol (e.g. the SMTP EHLO name, as used exploiting Exim) then you might have something. For OpenSSH this would suggest host names in port-forwarding. Close, but no cigar, even if OpenSSH did use gethostbyname() directly</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/comment-page-1/#comment-1335398</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Jan 2015 09:38:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29923#comment-1335398</guid>
		<description><![CDATA[Busting the Ghost Security Vulnerability Haunting Linux Systems
http://www.securityweek.com/busting-ghost-security-vulnerability-haunting-linux-systems

A bug is haunting Linux systems.

The Ghost vulnerability recently revealed by researchers at Qualys has triggered comparisons to Shellshock, but some experts say that both the impact and how organizations should approach patching it is different.

&quot;Applying a patch to bash and rolling out a newer version to me seems a lot easier,&quot; said Jon Passki, lead security researcher at Coverity. &quot;None of its dependencies are touched, so the fix can be very specific. As a sysadmin or someone in security operations, I&#039;d rather have Shellshock than Ghost.&quot;

Ghost is a buffer overflow issue in the Linux glibc library. If the bug is exploited, it could enable an attacker to take control of a targeted system.

&quot;Glibc (libc) is a core library for many packages and for the host operating system,&quot; 

he short of it is upgrading from one version of glibc to another isn&#039;t possible until the main operating system is upgraded. Then you get into third party packages. They often write and compile against certain versions of libc. Again, they&#039;re in the same boat. For example, maybe there&#039;s a bug in libc that prevents their application from working, so they&#039;ll compile to an older version

&quot;Libc might backport the fix because of all the aforementioned issues,&quot; he added. &quot;That would still require, in some cases, applications to be recompiled with the now patched backported libc…So there will be a lag in when those new versions are available.&quot;

Patching glibc is a little different than a library like OpenSSL due to kernel and build tool dependencies

According to Qualys, the first vulnerable version of the GNU C Library affected by this is glibc-2.2, which was released on Nov. 10, 2000. There are a number of factors that mitigate the bug however; for example, the issue was actually fixed on May 21, 2013, between the releases of glibc-2.17 and glibc-2.18. However, most stable and long-term-support distributions were left exposed including Debian 7 (wheezy), Red Hat Enterprise Linux 6 and 7, CentOS 6 and 7 and Ubuntu 12.04.

The release of a fix in 2013 means that many newer Linux operating systems were never at risk

&quot;Secondly, not all applications are at equal risk,&quot; Kinger added. &quot;Exploitation is very difficult as an attacker only has a small amount of initial exploit code that can be used: 4 or 8 bytes (depending on whether the system is a 32- or 64-bit system). Additional code must be written to an address referenced by a pointer which the attacker can modify. As a result, many apps are not at risk. So far, we are not aware of any potential web attack vectors, which reduces the attack surface considerably.&quot;

The GHOST.c utility included in the original advisory can quickly tell you whether or not the local glibc has been patched, said Moore.

Qualys Security Advisory CVE-2015-0235
GHOST: glibc gethostbyname buffer overflow
https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt

procmail (a SUID-root and SGID-mail binary) is vulnerable through its
&quot;comsat/biff&quot; feature:

Conclusion: more than 3 dots is impossible,
and neither ping nor arping is vulnerable.

The Exim mail server is exploitable remotely if configured to perform
extra security checks on the HELO and EHLO commands

pppd (yet another SUID-root binary) calls gethostbyname() if a
preliminary call to inet_addr() (a simple wrapper around inet_aton())
fails. &quot;The inet_addr() function converts the Internet host address cp
from IPv4 numbers-and-dots notation into binary data in network byte
order. If the input is invalid, INADDR_NONE (usually -1) is returned.
Use of this function is problematic because -1 is a valid address
(255.255.255.255).&quot; A failure for inet_addr(), but a success for
inet_aton(), and consequently a path to the buffer overflow.]]></description>
		<content:encoded><![CDATA[<p>Busting the Ghost Security Vulnerability Haunting Linux Systems<br />
<a href="http://www.securityweek.com/busting-ghost-security-vulnerability-haunting-linux-systems" rel="nofollow">http://www.securityweek.com/busting-ghost-security-vulnerability-haunting-linux-systems</a></p>
<p>A bug is haunting Linux systems.</p>
<p>The Ghost vulnerability recently revealed by researchers at Qualys has triggered comparisons to Shellshock, but some experts say that both the impact and how organizations should approach patching it is different.</p>
<p>&#8220;Applying a patch to bash and rolling out a newer version to me seems a lot easier,&#8221; said Jon Passki, lead security researcher at Coverity. &#8220;None of its dependencies are touched, so the fix can be very specific. As a sysadmin or someone in security operations, I&#8217;d rather have Shellshock than Ghost.&#8221;</p>
<p>Ghost is a buffer overflow issue in the Linux glibc library. If the bug is exploited, it could enable an attacker to take control of a targeted system.</p>
<p>&#8220;Glibc (libc) is a core library for many packages and for the host operating system,&#8221; </p>
<p>he short of it is upgrading from one version of glibc to another isn&#8217;t possible until the main operating system is upgraded. Then you get into third party packages. They often write and compile against certain versions of libc. Again, they&#8217;re in the same boat. For example, maybe there&#8217;s a bug in libc that prevents their application from working, so they&#8217;ll compile to an older version</p>
<p>&#8220;Libc might backport the fix because of all the aforementioned issues,&#8221; he added. &#8220;That would still require, in some cases, applications to be recompiled with the now patched backported libc…So there will be a lag in when those new versions are available.&#8221;</p>
<p>Patching glibc is a little different than a library like OpenSSL due to kernel and build tool dependencies</p>
<p>According to Qualys, the first vulnerable version of the GNU C Library affected by this is glibc-2.2, which was released on Nov. 10, 2000. There are a number of factors that mitigate the bug however; for example, the issue was actually fixed on May 21, 2013, between the releases of glibc-2.17 and glibc-2.18. However, most stable and long-term-support distributions were left exposed including Debian 7 (wheezy), Red Hat Enterprise Linux 6 and 7, CentOS 6 and 7 and Ubuntu 12.04.</p>
<p>The release of a fix in 2013 means that many newer Linux operating systems were never at risk</p>
<p>&#8220;Secondly, not all applications are at equal risk,&#8221; Kinger added. &#8220;Exploitation is very difficult as an attacker only has a small amount of initial exploit code that can be used: 4 or 8 bytes (depending on whether the system is a 32- or 64-bit system). Additional code must be written to an address referenced by a pointer which the attacker can modify. As a result, many apps are not at risk. So far, we are not aware of any potential web attack vectors, which reduces the attack surface considerably.&#8221;</p>
<p>The GHOST.c utility included in the original advisory can quickly tell you whether or not the local glibc has been patched, said Moore.</p>
<p>Qualys Security Advisory CVE-2015-0235<br />
GHOST: glibc gethostbyname buffer overflow<br />
<a href="https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt" rel="nofollow">https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt</a></p>
<p>procmail (a SUID-root and SGID-mail binary) is vulnerable through its<br />
&#8220;comsat/biff&#8221; feature:</p>
<p>Conclusion: more than 3 dots is impossible,<br />
and neither ping nor arping is vulnerable.</p>
<p>The Exim mail server is exploitable remotely if configured to perform<br />
extra security checks on the HELO and EHLO commands</p>
<p>pppd (yet another SUID-root binary) calls gethostbyname() if a<br />
preliminary call to inet_addr() (a simple wrapper around inet_aton())<br />
fails. &#8220;The inet_addr() function converts the Internet host address cp<br />
from IPv4 numbers-and-dots notation into binary data in network byte<br />
order. If the input is invalid, INADDR_NONE (usually -1) is returned.<br />
Use of this function is problematic because -1 is a valid address<br />
(255.255.255.255).&#8221; A failure for inet_addr(), but a success for<br />
inet_aton(), and consequently a path to the buffer overflow.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/01/28/ghost-security-bug-in-linux/comment-page-1/#comment-1334914</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 29 Jan 2015 12:31:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29923#comment-1334914</guid>
		<description><![CDATA[Moore agreed with other experts that Ghost - although worthy of immediate triage - was nowhere near as serious as the infamous Heartbleed OpenSSL security vulnerability.

&quot;To be clear, this is NOT the end of the Internet as we know it, nor is it another Heartbleed. In a general sense, it’s not likely to be an easy bug to exploit. One easily-exploitable case identified so far is the Exim mail server. An attacker could abuse this vulnerability to execute arbitrary commands on an unpatched server.&quot;

&quot;Still, it could potentially be nasty if exploited so we strongly recommend immediate patching and rebooting. Without a reboot, services using the old library will not be restarted,” Moore concluded.

Source: http://www.theregister.co.uk/2015/01/28/ghost_linux_megavuln_analysis/]]></description>
		<content:encoded><![CDATA[<p>Moore agreed with other experts that Ghost &#8211; although worthy of immediate triage &#8211; was nowhere near as serious as the infamous Heartbleed OpenSSL security vulnerability.</p>
<p>&#8220;To be clear, this is NOT the end of the Internet as we know it, nor is it another Heartbleed. In a general sense, it’s not likely to be an easy bug to exploit. One easily-exploitable case identified so far is the Exim mail server. An attacker could abuse this vulnerability to execute arbitrary commands on an unpatched server.&#8221;</p>
<p>&#8220;Still, it could potentially be nasty if exploited so we strongly recommend immediate patching and rebooting. Without a reboot, services using the old library will not be restarted,” Moore concluded.</p>
<p>Source: <a href="http://www.theregister.co.uk/2015/01/28/ghost_linux_megavuln_analysis/" rel="nofollow">http://www.theregister.co.uk/2015/01/28/ghost_linux_megavuln_analysis/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
