Linux 'Ghost' vulnerability uncovered

Security researchers said the issue affects the system's GNU C Library

Security researchers at Qualys have discovered a Linux vulnerability, naming it 'Ghost'.

The vulnerability affects the GNU C Library (previously known as glibc) in Linux systems, triggered by calling the gethostbyname*() functions in glibc, used to resolve domain names into IP addresses.

In real terms, this means attackers can take control of a system without knowing any login data.

Wolfgang Kandek, CTO at Qualys, said in a blog post: "There is a remote code execution risk due to this vulnerability. An attacker who exploits this issue can gain complete control of the compromised system."

"During our testing, we developed a proof-of-concept in which we send a specially created e-mail to a mail server and can get a remote shell to the Linux machine. This bypasses all existing protections (like ASLR, PIE and NX) on both 32-bit and 64-bit systems."

However, the impact the vulnerability can have is lower than others that have been discovered over the last 12 months.

Pawan Kinger, director of  Deep Security Labs at Trend Micro, commented: "Taken together, the risk of actual exploits targeting GHOST is relatively small compared to other vulnerabilities like Shellshock or Heartbleed. Yes, the underlying vulnerability is problematic, but defense in depth by other vendors means that the actual risk is relatively low."

The reason for this is that the vulnerability has already been patched for newer versions of Linux and Qualys will not reveal the exploit until it has reached its half-life.

Kinger went on to explain that exploitation is also difficult because the attacker will only have four or eight bytes to use in the attack and additional code must be written to an address that the attacker can modify.

"Thirdly, the functions that are the subject of this vulnerability are obsolete. They cannot be used to translate domain names to IPv6 addresses; newer applications use the getaddrinfo() function, which does have IPv6 support," he explained.

Featured Resources

Five lessons learned from the pivot to a distributed workforce

Delivering continuity and scale with a remote work strategy

Download now

Connected experiences in a digital transformation

Enable businesses to meet the demands of the future

Download now

Simplify to secure

Reduce complexity by integrating your security ecosystem

Download now

Enhance the safety and security of your people, assets and operations

Enable a true vision of security with an engineered solution based on hyperconverged and storage platforms

Download now

Recommended

'Largest ever' Magecart hack compromises 2,000 online stores
hacking

'Largest ever' Magecart hack compromises 2,000 online stores

15 Sep 2020
Infocyte integrates with Palo Alto Networks Cortex XSOAR
cyber security

Infocyte integrates with Palo Alto Networks Cortex XSOAR

19 Aug 2020
Andrew Daniels joins Druva as CIO and CISO
Cloud

Andrew Daniels joins Druva as CIO and CISO

22 Jul 2020
University of California gets fleeced by hackers for $1.14 million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020

Most Popular

Accenture ploughs $3 billion into cloud migration support group
digital transformation

Accenture ploughs $3 billion into cloud migration support group

17 Sep 2020
Google Pixel 4a review: A picture-perfect package
Google Android

Google Pixel 4a review: A picture-perfect package

18 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020