exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20150128-ghost

Cisco Security Advisory 20150128-ghost
Posted Jan 29, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. The glibc library is a commonly used third-party software component that is released by the GNU software project and a number of Cisco products are likely affected. This advisory will be updated as additional information becomes available. Cisco will release free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

tags | advisory, remote, overflow, code execution
systems | cisco
SHA-256 | 2e0026b3d1367be53ce21e71b130653197f3f5ca3990e8209a45096c3c52ad87

Cisco Security Advisory 20150128-ghost

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Cisco Security Advisory: GNU glibc gethostbyname Function Buffer Overflow Vulnerability

Advisory ID: cisco-sa-20150128-ghost

Revision 1.0

For Public Release 2015 January 28 22:30 UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited.

The glibc library is a commonly used third-party software component that is released by the GNU software project and a number of Cisco products are likely affected.

This advisory will be updated as additional information becomes available. Cisco will release free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
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=APX3
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close