Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2015-0235
Severity
10.0CRITICAL
EPSS
84.9%
top 0.65%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 28
Latest updateMay 13
Description
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
CVSS vector
AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0
Affected Packages18 packages
Also affects: Debian Linux 7.0, 8.0
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-jwcp-p679-fcr4: Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2↗2022-05-13
OSV▶
CVE-2015-0235: Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2↗2015-01-28
CVEList▶
CVE-2015-0235: Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2↗2015-01-28