Linux 'Ghost' vulnerability uncovered

Security researchers said the issue affects the system's GNU C Library

Security researchers at Qualys have discovered a Linux vulnerability, naming it 'Ghost'.

The vulnerability affects the GNU C Library (previously known as glibc) in Linux systems, triggered by calling the gethostbyname*() functions in glibc, used to resolve domain names into IP addresses.

In real terms, this means attackers can take control of a system without knowing any login data.

Wolfgang Kandek, CTO at Qualys, said in a blog post: "There is a remote code execution risk due to this vulnerability. An attacker who exploits this issue can gain complete control of the compromised system."

Advertisement
Advertisement - Article continues below

"During our testing, we developed a proof-of-concept in which we send a specially created e-mail to a mail server and can get a remote shell to the Linux machine. This bypasses all existing protections (like ASLR, PIE and NX) on both 32-bit and 64-bit systems."

However, the impact the vulnerability can have is lower than others that have been discovered over the last 12 months.

Pawan Kinger, director of  Deep Security Labs at Trend Micro, commented: "Taken together, the risk of actual exploits targeting GHOST is relatively small compared to other vulnerabilities like Shellshock or Heartbleed. Yes, the underlying vulnerability is problematic, but defense in depth by other vendors means that the actual risk is relatively low."

The reason for this is that the vulnerability has already been patched for newer versions of Linux and Qualys will not reveal the exploit until it has reached its half-life.

Kinger went on to explain that exploitation is also difficult because the attacker will only have four or eight bytes to use in the attack and additional code must be written to an address that the attacker can modify.

"Thirdly, the functions that are the subject of this vulnerability are obsolete. They cannot be used to translate domain names to IPv6 addresses; newer applications use the getaddrinfo() function, which does have IPv6 support," he explained.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/open-source/34540/view-from-the-airport-linux-open-networking-summit-2019
open source

View from the airport: Linux Open Networking Summit 2019

1 Oct 2019
Visit/software/28109/what-is-open-source
Software

What is open source?

13 Sep 2019
Visit/operating-systems/28025/best-linux-distros-2019-the-finest-open-source-operating-systems-around
operating systems

Best Linux distros 2019

18 Jun 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/business/business-strategy/354195/where-modernisation-and-sustainability-meet-a-tale-of-two
Sponsored

Where modernisation and sustainability meet: A tale of two benefits

25 Nov 2019