Most mainstream Linux platforms, including Debian 7 (Wheezy), RHEL 6 & 7, CentOS 6 & 7, and Ubuntu 12.04, using versions of the GNU C Library (glibc) from 2.2 to before 2.18 are now known to be vulnerable to a buffer overflow attack.

CVE-2015-0235 details the nature of the vulnerability and how it can be exploited.The gethostbyname() and gethostbyname2() glibc function call could be used to exploit this flaw and execute arbitrary code with the permissions of the user running the application.

Patches are already available so you are advised to run updates now, but if you want to check which version of glibc is installed on your host,

[[email protected] ~]# ldd --version                                              
ldd (GNU libc) 2.12                                                       
Copyright (C) 2010 Free Software Foundation, Inc.                         
This is free software; see the source for copying conditions.  There is NO
Written by Roland McGrath and Ulrich Drepper.                             
[[email protected] ~]#                                                          

Use System -> Administration -> Software update (example from CentOS 6)

Or simply run a

sudo yum clean all

sudo yum update

Vulnerability management is a key security best practice but must be operated in conjunction with a 'closed loop' of change control, patching, system integrity verification and file integrity change review.


For more information on GHOST, see GHOST Vulnerability CVE-2015-0235



The Most Powerful & Reliable Cybersecurity Products
Contact Us

USA Offices

New Net Technologies LLC
4850 Tamiami Trail, Suite 301
Naples, Florida, 34103

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
[email protected]


UK Office

New Net Technologies Ltd
The Russell Building, West Common
Harpenden, Hertfordshire

Tel: 020 3917 4995
 [email protected]

SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Sans Institute Now Certified IBM Security
Copyright 2022, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.